A recent Smartwatch exposes the location of more than 5,000 children and parents. Chinese SMA-Watch-M2 is one of the most vulnerable smartwatches in the market to date. The IoT testing division AV-TEST found enormous amounts of security measures in place to protect the backends of mobile apps.
Many Network Security students and individuals in everyday life are concerned about identity protection and rightfully so. Trusted companies are breached every day and information is leaked. The legal aspect aside, it still happens and private information is still breached. This is one reason information should be monitored and watched over. Some of the resources for my identity protection I use are going to be listed below.
Last week the UAT CCDC team competed in the last invitational—or practice round—of the season for the Western Regional Collegiate Cyber Defense Competition (WRCCDC). At WRCCDC colleges compete against each other in maintaining and securing servers. This experience was only our second invitational. (You can learn more about our first go around here.)