Index
A
- abuse types (see threat agents)
- access tokens, Single-factor authentication, One Token to Rule them All-One Token to Rule them All, Cross-Device Attacks
- Accessory Protocol Interface Module (APIM), Bluetooth Vulnerabilities
- Advanced Encryption Standards (AES), Understanding Weaknesses in BLE and Using Packet-Capture Tools
- advertising packet, Understanding Weaknesses in BLE and Using Packet-Capture Tools
- advertising, targeted, The Data Tsunami
- Amazon Echo, Hearing Voices-Hearing Voices
- amplitude-shift keying (ASK) modulation, Reversing TPMS Communication
- Anonymous, Hacktivists
- Apple, Single-factor authentication, Secure Prototyping—littleBits and cloudBit
- (see also iOS; iOS apps)
- apps
- Kevo Kwikset door lock, Bluetooth Low Energy and Unlocking via Mobile Apps, Kevo Mobile App Insecurities-Conclusion
- malicious, Bluetooth Vulnerabilities
- native binaries, The Samsung LExxB650 Series
- Skype, Remotely Exploiting a Samsung Smart TV-Remotely Exploiting a Samsung Smart TV
- SmartThings (see SmartThings)
- WeMo Switch, Some Things Never Change: The WeMo Switch-Some Things Never Change: The WeMo Switch
- Arduino microcontrollers, Microcontroller vulnerability, Vendor Response
- attack types (see threat agents)
- attack vectors, future (see future threats)
- audio-based personal assistants, Hearing Voices-Hearing Voices
- authentication challenge, Vulnerabilities in Telematics
- authentication, single- versus two-factor, Single-factor authentication
- autopilot versus autonomous car technology, AutoPilot and the Autonomous Car ...
Get Abusing the Internet of Things now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.