Billions of Devices at Risk of Hacking Due to Hidden Commands

Billions of Devices at Risk of Hacking Due to Hidden Commands

Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented “hidden commands.” Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth and Wi-Fi connections in numerous smart devices, including smartphones, laptops, smart locks, and medical equipment. Its popularity is partly due…

Read More

Next-generation security: Blending cyber and physical strategies for optimal protection

Next-generation security: Blending cyber and physical strategies for optimal protection

In today’s rapidly evolving technological landscape, cyber and physical security convergence has become more critical than ever. With the rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT), organizations face unique challenges in safeguarding digital and physical assets. This article explores the concept of security convergence, real-world incidents that illustrate its importance, and best practices for integrating cyber and physical security measures. Understanding cyber and physical security convergence Cyber and…

Read More

4 steps to defend against cyber attack risk

4 steps to defend against cyber attack risk

4 steps to defend against cyber attack risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How organizations can focus cybersecurity investments

How organizations can focus cybersecurity investments

How organizations can focus cybersecurity investments | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity fundamentals for logistics partners

Cybersecurity fundamentals for logistics partners

Cybersecurity fundamentals for logistics partners | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Gaps in agency cybersecurity measures

Gaps in agency cybersecurity measures

Gaps in agency cybersecurity measures | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

5 cyber threats facing the education sector

5 cyber threats facing the education sector

<!– 5 cyber threats facing the education sector | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Implement NIST IoT cybersecurity guidelines early

Implement NIST IoT cybersecurity guidelines early

Implement NIST IoT cybersecurity guidelines early | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More