Table of contentsThe Short AnswerThe Long (but Important) AnswerSmart Homes and IoTIoT Security StandardsThe Average Smart Home SetupConclusionWhat does this mean for you?Keeping yourself safeReferences Can Smart Homes be Hacked? This is
Table of contentsWhat is War-Driving?Attack Scale40 Million Credit & Debit Cards StolenConclusionWhat can you do?Read MoreReferences Drive-by Wi-Fi hacking sounds like a bad joke or the plot for a B-movie, however,
Table of contentsA brief History of IoTWhat makes these devices Insecure?A Lack of StandardizationDifficult to AdministerPower RequirementsConclusionWill we ever be Safe?Must Reads Why are IoT devices insecure? There is an old
Table of contentsThe AttackAttack MethodsPotential SolutionsConclusionsRead More In this article, we will be going over a potentially devastating cyberattack that occurred recently in the town of Oldsmar, Florida. This hack is of particular
Table of contentsThe Modern Hacking ProcessHow does Wi-Fi work? (A simple analogy)Coded CommunicationThe 4-way HandshakeWi-Fi Attack GoalsHacking your home Wi-Fi in 3 stepsForced Deactivation – Step 1Credential Sniffing – Step 2Device Impersonation