Table of contentsThe Modern Hacking ProcessHow does Wi-Fi work? (A simple analogy)Coded CommunicationThe 4-way HandshakeWi-Fi Attack GoalsHacking your home Wi-Fi in 3 stepsForced Deactivation – Step 1Credential Sniffing – Step 2Device Impersonation
Table of contentsInsecure EavesdroppingWhy do you need my Address?Shh…Actually Watching YouConclusionWhat you can doLearn MoreReferences Today we are going to be talking about 4 ways your smart tv is watching
Table of contentsWhat is a Smart Plug?The benefits of Smart PlugsLow initial costMinimal configurationEnergy cost savingsSize footprintDo Smart Plugs pose security a risk?Insecure communicationA lack of device authenticationConclusionLearn moreReferences Are Smart
Table of contentsWait, smart bulbs can be used for spying? How smart bulbs spy on youBulb Telemetry (tracking when it’s turned on/off)In-home Location tracking (and mapping)Always On (even
Network security is complex, in this post we are going to argue why Home Network Security should be simplified if it is to be effective. Some Background Whilst rebuilding our main dashboard to