Smart Home Privacy Exposed? CUHK and Others Use LSTM to Tackle IoT Security Settings

Smart Home Privacy Exposed? CUHK and Others Use LSTM to Tackle IoT Security Settings

Original by Machine Heart Author: Lu Xinfeng Editor: Joni In August of this year, Professor Zhang Kehua’s research group at the Chinese University of Hong Kong published a paper on arXiv, showcasing their research on the privacy of smart homes. The authors attempted to use an LSTM model to predict active devices in smart homes. … Read more

Key Injection: The ‘Digital Identity’ of IoT Devices

Key Injection: The 'Digital Identity' of IoT Devices

In today’s world, where information security is increasingly important, key injection has become the cornerstone of security for many critical devices and systems. Whether in the encryption protection of Internet of Things (IoT) devices or in data transmission within payment systems, key injection plays a crucial role. Key injection not only ensures the security of … Read more

Analysis of the Current Status and Development Trends of the IoT Security Industry in 2025

Analysis of the Current Status and Development Trends of the IoT Security Industry in 2025

Click the “blue text” above to select “Set as Favorite“ Key information, delivered on D1 time! With the rapid development and popularization of IoT technology, IoT security, as an important application of IoT technology in the security field, is gradually changing the landscape of the traditional security industry. IoT security achieves real-time monitoring, early warning, … Read more

Five Major Myths About IoT Security

Five Major Myths About IoT Security

The value generated by data far exceeds the value of global goods trade —— McKinsey, “Digital Globalization” (2016) There are billions of connected IoT devices globally. These devices span multiple industries, whether they are security cameras, health monitoring devices, or simple office printers, they possess transformative power. However, with the explosive growth of connected technology, … Read more

The Japanese Government Begins Testing the Security of Nationwide IoT Devices

The Japanese Government Begins Testing the Security of Nationwide IoT Devices

Click Subscribe to the “IEEE Electrical and Electronics Engineers Society” by clicking above. Stay updated on global technological advancements and open your mind for research and entrepreneurship. Illustration Source:iStockphoto Since February 20, the National Institute of Information and Communications Technology (NICT) in Japan has begun testing the security of IoT devices owned by citizens and … Read more

How LoRa, Starting Earlier than NB-IoT, Seizes the Trillion Yuan IoT Market in China

LoRa&IoT For Semtech, there is a seemingly “sweet” trouble. That is, the recognition of their product LoRa far exceeds that of their company name Semtech. However, the “awkward” part is not just this. As two of the most promising low-power wide-area network communication technologies in China, NB-IoT and LoRa have always been compared, with many … Read more

Smart Appliances, Cameras, Door Locks… Beware! IoT Devices Are ‘Selling’ Your Privacy

Smart Appliances, Cameras, Door Locks... Beware! IoT Devices Are 'Selling' Your Privacy

IntroductionAfter the “N Room” incident in South Korea, public concern over privacy breaches from surveillance devices has resurfaced. With the rapid development of the Internet of Things (IoT), smart cameras and appliances are increasingly favored. However, some of these convenient IoT devices can also become the “eyes and ears” for criminals, forming a networked, chain-like … Read more

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Introduction In today’s world, who doesn’t need to guard against theft and intruders? Cloud security cameras have become increasingly popular. However, despite being labeled as “security” cameras, their actual security may not be very robust. The Motorola Focus 73 outdoor security camera is a case in point. The Motorola Focus 73 camera is an outdoor … Read more

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Introduction: With the gradual development of the Internet of Things (IoT) era, the connections between devices have become closer, and each node cannot exist independently. Devices that are closely related to our daily lives, such as routers, cameras, and printers, increasingly impact various aspects of our lives, from personal privacy to intelligence gathering between hostile … Read more