Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
The ring doorbell could have been hacked to show fake images
- This topic has 4 replies, 1 voice, and was last updated 2 years, 1 month ago by .
A recently patched vulnerability on the ring doorbell could have let hackers feed fake images into the video feed or even obtain audio or video as it is broadcasted live. The feed was not robustly encrypted, which would allow a hacker with access to the victims wifi to inject data into the feed. This is another example of IoT constantly expanding and even smaller technologies being affected.
You must be logged in to reply to this topic.