Smart Home Devices Turn into ‘Life Spies’: How to Evict the ‘Invisible Guests’?

Smart Home Devices Turn into 'Life Spies': How to Evict the 'Invisible Guests'?

The smart vacuum cleaner in your home works right under your nose, while the ‘invisible guest’ watches you through its built-in camera… Recently, a smart vacuum cleaner from a South Korean brand was reported to have security vulnerabilities, allowing hackers to remotely control it and invade personal privacy.Click the audio to learn more! Originally intended … Read more

Smart Appliances, Cameras, Door Locks… Beware! IoT Devices Are ‘Selling’ Your Privacy

Smart Appliances, Cameras, Door Locks... Beware! IoT Devices Are 'Selling' Your Privacy

IntroductionAfter the “N Room” incident in South Korea, public concern over privacy breaches from surveillance devices has resurfaced. With the rapid development of the Internet of Things (IoT), smart cameras and appliances are increasingly favored. However, some of these convenient IoT devices can also become the “eyes and ears” for criminals, forming a networked, chain-like … Read more

Concern | Do You Think Smartwatches Make Children Safer? The Reality Might Be More Dangerous…

Concern | Do You Think Smartwatches Make Children Safer? The Reality Might Be More Dangerous...

Smartwatches that can monitor children’s safety are familiar to everyone. They integrate positioning, listening, and calling functions, allowing parents who cannot be with their children at all times to keep track of their status. Such products are quite popular in many countries; however, they have been banned in Germany. Why is that? â–³Video: Germany Bans … Read more

Smart Home Devices Turned into Peeping Tools: Your Privacy is Being Live-Streamed and Sold

Smart Home Devices Turned into Peeping Tools: Your Privacy is Being Live-Streamed and Sold

Your smart camera on the bedside table may currently be live-streaming in the dark web, being bid on at a price of 0.5 yuan per minute. In fact, in the first case of camera intrusion cracked by the Beijing police, hackers took only 19 days to gain control of over 200 households’ surveillance devices, with … Read more

Detailed Explanation of Wireless WiFi Password Cracking Techniques and Principles

Detailed Explanation of Wireless WiFi Password Cracking Techniques and Principles

Everyone has probably experienced that feeling when the WiFi in their home seems to be slowing down, wondering, “Is someone using my WiFi?” Sometimes, when we go out, we also want to try to use someone else’s WiFi. The premise of “borrowing WiFi” is to crack the other party’s “wireless password”. So, how secure is … Read more

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Author | Zhang Jiaqiu Liu Zhongjin 1 Introduction to BusyBox Components BusyBox is a commonly used component in embedded Linux, known as the “Swiss Army Knife of Embedded Linux.” It integrates commonly used UNIX commands into a single executable file. By streamlining functionality and sharing code, BusyBox retains the most commonly used features while significantly … Read more

Dog Barks and Plays with Embedded – I2C Protocol Analysis

Dog Barks and Plays with Embedded - I2C Protocol Analysis

0x00 Introduction Hacking embedded products has always been a hot topic. More and more attackers are targeting IoT embedded devices. Unlike traditional software security research, this type of research often requires a combination of relevant hardware knowledge and devices. In this article, Wang Wang will share practical cases and corresponding tool usage for the I2C … Read more