Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Vulnerabilities Found In Smart Scale
- This topic has 0 replies, 1 voice, and was last updated 2 years, 2 months ago by .
A new smart scale, the Smart Scale PW 5653 by AEG, has been found to be vulnerable to DoS and Man-in-Middle attacks when analyzed by researchers.
The vulnerabilities were mostly accomplished through exploits in the devices bluetooth connections. If the device were connected to the owners phone via bluetooth, by extension the phone would become vulnerable as well, as the devices app requests location and access to storage be turned on. The device was further shown through the iOS app to send user information to a server in China without the knowledge of the user.
You must be logged in to reply to this topic.