article thumbnail

Android devices could be hacked by playing a video due to CVE-2019-2107 flaw

Security Affairs

Playing a video on Android devices could be a dangerous operation due to a critical CVE-2019-2107 RCE flaw in Android OS between version 7.0 Playing a specially-crafted video on devices with the Android’s native video player application could allow attackers to compromise them due to a dangerous critical remote code execution flaw.

article thumbnail

FBI warns swatting attacks on owners of smart devices

Security Affairs

The Federal Bureau Investigation (FBI) is warning owners of smart home devices with voice and video capabilities of ‘swatting’ attacks. The FBI has recently issued an alert to warn owners of smart home devices with voice and video capabilities of so-called “swatting” attacks. team to a specific location.

Passwords 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. Device Security is Hard.

IoT 77
article thumbnail

MY TAKE: The role of semiconductors in bringing the ‘Internet of Everything’ into full fruition

The Last Watchdog

I recently visited with Thomas Rosteck, Division President of Connected Secure Systems (CSS) at Infineon Technologies , a global semiconductor manufacturer based in Neubiberg, Germany. Interconnected systems that can easily be hacked, of course, would be untenable. Cybersecurity remains a major obstacle that must be dealt with.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Even so, the car manufacturers carved out large groups of codes. Since then, car manufacturers have improved on this. Herfurt: Of course, it's a range thing and it's a bandwidth thing. And of course it's a frequency thing. And of course it's a frequency thing. It wasn't very robust. It was a mere 40 bit key length.

article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

Too often manufacturers prioritize releasing their products to market and interface connectivity rather than effective controls, all of which is made more difficult by the weak implementation of IoT standards, frameworks and basic security in designs.

IoT 144
article thumbnail

China: Navigating China episode 18: Increased scrutiny over connected car and automobile industry data from Chinese regulators, including push towards data localisation

DLA Piper Privacy Matters

The Draft Provisions apply across the industry, not just to vehicle designers and manufacturers, but also parts and software providers, dealers, maintenance and repair agencies, online car hailing organisations and insurance companies. outside of the vehicle; and. other data that may affect national security and public interests.