Tagged articles
26 articles
Page 1 of 1
Black & White Path
Black & White Path
May 6, 2026 · Information Security

Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance

Researchers from KTH demonstrated that a simple antenna placed about 1 meter from a Bluetooth device can capture RF emissions containing key‑related leakage, and using machine‑learning‑assisted analysis of roughly 90,000 traces they recover the full AES‑128 key, exposing a practical, non‑contact side‑channel threat and prompting hardware, firmware, and system‑level defenses.

AES-128BluetoothIoT security
0 likes · 7 min read
Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance
Black & White Path
Black & White Path
Feb 17, 2026 · Information Security

High Salaries Not Enough: 3 Big‑Tech Engineers Caught in fnOS Black‑Market Hacks

Police in Zhejiang dismantled a full‑cycle black‑market operation that stole, cracked and resold rental smartphones, arresting three high‑paid engineers from major internet firms who earned over ten million yuan by exploiting fnOS vulnerabilities, highlighting both technical methods and legal consequences.

IoT securityblack marketdevice hacking
0 likes · 12 min read
High Salaries Not Enough: 3 Big‑Tech Engineers Caught in fnOS Black‑Market Hacks
OPPO Amber Lab
OPPO Amber Lab
Mar 28, 2024 · Information Security

What Security Challenges Will Shape Smart AI Terminals? Insights from the 2024 IEEE‑OPPO Pan‑Terminal Security Forum

The 2024 IEEE‑OPPO Pan‑Terminal Security Forum, held on March 29 at Xi'an Jiaotong University, gathers leading researchers to discuss AI, IoT, blockchain, and smart contract security, presenting cutting‑edge threats, defense strategies, and future technical capabilities for intelligent terminal products.

AI securityIoT securityadversarial attacks
0 likes · 10 min read
What Security Challenges Will Shape Smart AI Terminals? Insights from the 2024 IEEE‑OPPO Pan‑Terminal Security Forum
360 Tech Engineering
360 Tech Engineering
Apr 21, 2023 · Information Security

FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study

This article introduces FirmAE, an automated framework for firmware emulation and vulnerability analysis, details its installation and usage steps on Ubuntu, and presents a comprehensive reverse‑engineering case study of a Zyxel router firmware to illustrate troubleshooting and manual analysis techniques.

AutomationEmulationFirmAE
0 likes · 8 min read
FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study
Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

IoT securitySecure BootTPM
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things
UCloud Tech
UCloud Tech
Dec 8, 2022 · Information Security

How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies

This article examines a recent 1.2 Tbps DDoS assault on a major UCloud client, detailing the attack timeline, mixed flood and connection‑exhaustion techniques, geographic and device source distribution, and UCloud’s comprehensive mitigation strategies and best‑practice recommendations for robust information security.

Cloud ProtectionDDoSIoT security
0 likes · 7 min read
How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies
21CTO
21CTO
Jan 22, 2022 · Information Security

What’s Driving the Surge of Linux‑Based IoT Malware in 2021?

The article examines how the proliferation of Linux‑powered IoT devices has made them prime targets for malware families like XorDDoS, Mirai and Mozi, highlighting their rapid growth, attack techniques, and recommended defensive measures for operators.

BotnetDDoSIoT security
0 likes · 8 min read
What’s Driving the Surge of Linux‑Based IoT Malware in 2021?
Liangxu Linux
Liangxu Linux
Nov 28, 2021 · Information Security

How to Use Shodan’s Python SDK for Device Discovery and Analysis

This guide explains what Shodan is, why internet‑connected devices are vulnerable, and provides step‑by‑step instructions—including environment setup, API key registration, basic Python searches, and advanced facet queries—to safely explore and analyze exposed devices.

APIDevice DiscoveryFacets
0 likes · 6 min read
How to Use Shodan’s Python SDK for Device Discovery and Analysis
OPPO Amber Lab
OPPO Amber Lab
Aug 3, 2021 · Information Security

Uncovering BLE: History, Security Risks, and How to Protect Your IoT Devices

This article traces the evolution of Bluetooth Low Energy (BLE), explains why it dominates modern IoT, and examines three major security threat vectors—protocol flaws, supply‑chain vulnerabilities, and product design weaknesses—while offering concrete mitigation strategies and reference resources.

BLEBluetooth Low EnergyIoT security
0 likes · 13 min read
Uncovering BLE: History, Security Risks, and How to Protect Your IoT Devices
21CTO
21CTO
Jun 24, 2021 · Fundamentals

Why IoT Is Booming Post‑Pandemic and Which Technologies Power It

The article explores how the COVID‑19 pandemic accelerated internet reliance, driving permanent consumer adoption of IoT devices, and examines the diverse technologies, security challenges, programming languages, operating systems, and cloud platforms that shape the rapid growth of the Internet of Things.

IoTIoT programmingIoT security
0 likes · 8 min read
Why IoT Is Booming Post‑Pandemic and Which Technologies Power It
OPPO Amber Lab
OPPO Amber Lab
Feb 19, 2021 · Information Security

How DICE Secures IoT Devices: From Unique IDs to Fast Boot

The article explains the DICE (Device Identity Composition Engine) standard introduced by the Trusted Computing Group, detailing its terminology, chain‑derived CDI mechanism, key generation, certificate issuance, and how it enables device identification, secure boot, rapid startup, data protection, and OTA firmware updates for IoT and mobile devices.

DICEDevice identityFirmware update
0 likes · 11 min read
How DICE Secures IoT Devices: From Unique IDs to Fast Boot
JD Cloud Developers
JD Cloud Developers
Dec 14, 2020 · Artificial Intelligence

What’s Shaping Tech This Week? AI Breakthroughs, Kubernetes 1.20, and More

This week’s tech roundup covers JD’s unmanned delivery demo, Windows 10’s upcoming Android app support, rapid digital RMB payments, the Kubernetes 1.20 release, China’s IoT security standard, Google’s MediaPipe Holistic for simultaneous face‑hand‑pose prediction, a crystal‑graph neural network for materials science, and emerging trends in multi‑label learning.

AICloud NativeIoT security
0 likes · 6 min read
What’s Shaping Tech This Week? AI Breakthroughs, Kubernetes 1.20, and More
Tencent Cloud Developer
Tencent Cloud Developer
Jul 23, 2020 · Information Security

IoT Security: Challenges, Differences from Traditional Internet Security, and Capability Building

As IoT devices proliferate across industries, their fragmented, resource‑constrained nature and continuous operation create security challenges distinct from traditional Internet security, prompting the need for specialized authentication, lightweight TLS, secure chips, trusted execution environments, software hardening, and emerging standards to protect the ecosystem.

Industry standardsIoT securityTEE
0 likes · 14 min read
IoT Security: Challenges, Differences from Traditional Internet Security, and Capability Building
Tencent Cloud Developer
Tencent Cloud Developer
May 28, 2019 · Industry Insights

Why Industrial IoT Is the Next Growth Engine and How Tencent’s Full‑Stack Solutions Solve Its Core Challenges

The article analyzes the rapid rise of industrial IoT, outlines four key obstacles—high investment cycles, fragmented connectivity, security risks, and immature standards—and explains how Tencent Cloud’s full‑stack IoT portfolio, including TencentOS tiny, IoT Explorer, Trust ID, and the IoT Marketplace, addresses these issues with real‑world smart‑manufacturing case studies.

Edge ComputingIndustrial IoTIoT Marketplace
0 likes · 13 min read
Why Industrial IoT Is the Next Growth Engine and How Tencent’s Full‑Stack Solutions Solve Its Core Challenges
21CTO
21CTO
Dec 30, 2018 · Blockchain

How Blockchain Is Transforming Digital Information Across Industries

Blockchain technology, originally linked to cryptocurrencies, is now reshaping digital information handling across sectors—from finance and IoT to advertising, healthcare, and creative industries—by providing secure, trustless transactions, reducing intermediaries, enhancing data integrity, and enabling new business models.

BlockchainDigital TransformationHealthcare
0 likes · 8 min read
How Blockchain Is Transforming Digital Information Across Industries
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 1, 2017 · Information Security

Can Ultrasonic Waves Hijack Your VR, Drones, and Smart Devices?

Alibaba Cloud security researchers revealed that simple ultrasonic signals around 27 kHz can disrupt a wide range of IoT devices—including VR/AR headsets, balance bikes, drones, and smartphones—by interfering with their MEMS sensors, prompting urgent mitigation advice presented at Black Hat USA.

IoT securityMEMS vulnerabilityVR safety
0 likes · 9 min read
Can Ultrasonic Waves Hijack Your VR, Drones, and Smart Devices?
21CTO
21CTO
Jun 16, 2017 · Fundamentals

11 Bold Predictions Shaping the Future of Programming

This article surveys eleven forward‑looking predictions—from cloud computing eclipsing Moore's law to IoT security challenges, video‑centric web experiences, AI‑driven features, evolving UI design, autonomous transport, legal constraints, and the rise of containers—highlighting how programmers must adapt to stay competitive.

IoT securitycloud computingfuture technology
0 likes · 12 min read
11 Bold Predictions Shaping the Future of Programming
Architects Research Society
Architects Research Society
Jun 6, 2017 · Information Security

Embedded vs. Bolt‑On Security in the Internet of Things: Risks and Mitigation Strategies

The article examines how built‑in (embedded) security differs from bolt‑on security in IoT devices, outlines real‑world attack scenarios—including physical and network exploits—and recommends foundational security designs to protect connected sensors, actuators, and smart environments.

IoT securitybolt‑on securityembedded security
0 likes · 8 min read
Embedded vs. Bolt‑On Security in the Internet of Things: Risks and Mitigation Strategies
Architects Research Society
Architects Research Society
May 11, 2017 · Information Security

Challenges and Responsibility Gaps in IoT and Mobile Security

The article examines the rapid rise of IoT and mobile applications in enterprises, highlights widespread security concerns, identifies unclear responsibility for protection, and presents survey findings that reveal organizational uncertainty and pressure on developers that exacerbate security risks.

Enterprise riskIoT securityMobile Security
0 likes · 5 min read
Challenges and Responsibility Gaps in IoT and Mobile Security
Architects Research Society
Architects Research Society
Apr 30, 2017 · Information Security

Key Insights from RSA 2016: Emerging IoT Security Trends and Predictions

The 2016 RSA Conference in San Francisco highlighted IoT as the top security trend, with experts discussing the shift from observation to solutions, the rise of PKI, chip‑to‑cloud protection, regulatory impacts, ransomware threats, and the potential of blockchain to manage massive IoT data challenges.

BlockchainConnected DevicesCyber Threat Intelligence
0 likes · 9 min read
Key Insights from RSA 2016: Emerging IoT Security Trends and Predictions
ITPUB
ITPUB
Jan 13, 2016 · Information Security

How Hackers Exploit Smart Doorbells to Steal Your Wi‑Fi Password in Minutes

A recent security report reveals that hackers can compromise popular smart doorbells by unscrewing two screws, forcing the device into AP mode, accessing its built‑in web server via a special URL, and extracting the Wi‑Fi SSID and PSK, highlighting the broader vulnerability of IoT home devices.

Firmware updateIoT securityPen Test Partners
0 likes · 3 min read
How Hackers Exploit Smart Doorbells to Steal Your Wi‑Fi Password in Minutes