Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
researchers discover method of exploiting robotic vacuums to gather audio data
- This topic has 0 replies, 1 voice, and was last updated 3 months, 1 week ago by .
-
Topic
-
a little bit about this: researchers accessed the lidar information stored on robotic vacuums (like roomba) to extract audio data such as numbers, music, the sound of carpets etc.
The vacuum had to be previously compromised
The researchers had to be on the same network as the device.
Researchers gained root access to the device by exploiting an issue in the endpoint server of the device. While the information gained from the vacuum was fairly limited, and the requirements of the device being previously compromised, and being on the same network are limiting in the actual application of the exploit, researchers also think that a similar method could be used on smart phones.
regardless, it’s an important reminder to be especially mindful of security, especially as more of our devices are “smart” and present new avenues of exploitation.
https://threatpost.com/robot-vacuums-audio-lidarphone-hack/161421/
You must be logged in to reply to this topic.