Table of contentsWhat is War-Driving?Attack Scale40 Million Credit & Debit Cards StolenConclusionWhat can you do?Read MoreReferences Drive-by Wi-Fi hacking sounds like a bad joke or the plot for a B-movie, however,
Table of contentsThe Modern Hacking ProcessHow does Wi-Fi work? (A simple analogy)Coded CommunicationThe 4-way HandshakeWi-Fi Attack GoalsHacking your home Wi-Fi in 3 stepsForced Deactivation – Step 1Credential Sniffing – Step 2Device Impersonation
Table of contentsInsecure EavesdroppingWhy do you need my Address?Shh…Actually Watching YouConclusionWhat you can doLearn MoreReferences Today we are going to be talking about 4 ways your smart tv is watching
Table of contentsWhat is a Smart Plug?The benefits of Smart PlugsLow initial costMinimal configurationEnergy cost savingsSize footprintDo Smart Plugs pose security a risk?Insecure communicationA lack of device authenticationConclusionLearn moreReferences Are Smart
Table of contentsWait, smart bulbs can be used for spying? How smart bulbs spy on youBulb Telemetry (tracking when it’s turned on/off)In-home Location tracking (and mapping)Always On (even