article thumbnail

IoT: Living at the edge  

OpenText Information Management

You: What is IoT? VIPER: Well, if IoT was an emoji or an expression, it would be: (1) a cloud with legs, (2) a tornado of devices, or (3) an air-tag tracking anything (keys, dog, purse, avocado). Five years ago, IoT was about smart devices (i.e., Watch the five-minute Aviator IoT demo. Which do you think it is?

IoT 67
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Within the last couple of months, smart device vulnerabilities have been piling up, prompting businesses to protect their Internet of Things (IoT) environments. While Teslas aren’t the typical business IoT device, their connection to the internet makes them a cyber threat as much as your business’s other IoT technology.

IoT 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters.

IoT 77
article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and take control of alarms and plugs. Below is a video demo published by the researcher that shows how to exploit the flaw CVE-2023–1748 to obtain users’ info.

article thumbnail

Be a part of OpenText World Europe 2024 in Munich

OpenText Information Management

From breakout sessions and turbo talks to hands-on labs and product demos, your OpenText World Europe 2024 experience will let you discover real-world use cases and gain actionable insights to propel your organization to new heights. While you’re wandering the show floor, take time out to see AI in action at the Aviator IoT LEGO® Experience.

IoT 62
article thumbnail

Vulnerabilities in car alarm systems exposed 3 million cars to hack

Security Affairs

Both products allow anyone to create a test/demo account. With that demo account it’s possible to access any genuine account and retrieve their details, ” states Pen Test Partners. “We’ve seen easy to exploit IDORs in IoT APIs on many occasions. ” conclude the expert.

article thumbnail

The Internet of Things is a Complete Mess (and how to Fix it)

Troy Hunt

I've spent more time IoT'ing my house over the last year than any sane person ever should. Plus, it's definitely added to our lives in terms of the things it enables us to do; see them in part 5 of my IoT unravelled blog series. You also want to be able to change the colour because hey, that's kinda cool.

IoT 143