Vulnerabilities and attack vectors were only a matter of time for these types of devices. Please read the article closely and note that only older (pre-2017) devices are vulnerable and physical access is needed. You should be very cautious when buying a used device or a device from a 3rd party reseller.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page