Take a Virtual, Interactive Tour 

Cyber Security, smartwatch, People, Places, and Things

3 Min Read

Bad Cheap Tech Is Not Good. Protect Yourself And Your Loved Ones.

A recent Smartwatch exposes the location of more than 5,000 children and parents. Chinese SMA-Watch-M2 is one of the most vulnerable smartwatches in the market to date. The IoT testing division AV-TEST found enormous amounts of security measures in place to protect the backends of mobile apps. 

TherWoman using smartwatch against home control centree is an authentication token in place to prevent unauthorized access but there is no verifying process so an attacker can input any token they like.

"An attacker can connect to this web API, cycle through all user IDs, and collect data on all kids and their parents. Morgenstern says that using this technique, his team was able to identify more than 5,000 M2 smartwatch wearers and more than 10,000 parent accounts." (ZDNet

There is a more disturbing vulnerability, attackers are able to change the parent IDs and use their phones to pair with the children smartwatch which allows them to track them and make calls and chats with the child. So far the watch is banned in Germany and being pulled off shelves in the EU.

Courtesty of Catalin Cimpanu

Visit www.uat.edu for information on their Cyber Security, Network Security and Technology Forensics degrees.


GitHub Wants Your Policy Proposals

In light of the recent leak of Twitch’s source code (over 6,000 private GH repositories) and other information, through a 125GB data torrent over 4chan.org, GitHub (GH) is now stepping up their ...
Picture of Micah Turpin Micah Turpin 3 Min Read

Golang the new standard for malware langauge?

In a recent security report by cybersecurity firm Intezer, they reported that a huge spike of malware strains being coded in Go programming has increased about 2,000% in recent years.

VMware vulnerability leaves about 6,700 servers ripe for the picking.

VMware vCenter servers have been hit in a new attack which left them exposed and vulnerable by the hackers which allowed them to take over any unpatched machine and take over companies' entire ...