IoT Unravelled Part 3: Security
Troy Hunt
NOVEMBER 25, 2020
Another example also from Context Security was the vulnerability in CloudPets talking (and listening ) teddy bears that amounted to no auth on the Bluetooth allowing an attacker to take control of the toy. Are these examples actually risks in IoT? Or are they just the same old risks we've always had with data stored on the internet?
Let's personalize your content