all InfoSec news
IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks. (arXiv:2208.13343v1 [cs.CR])
Aug. 30, 2022, 1:20 a.m. | Steve Kerrison
cs.CR updates on arXiv.org arxiv.org
Electronic locks can provide security- and convenience-enhancing features,
with fingerprint readers an increasingly common feature in these products. When
equipped with a wireless radio, they become a smart lock and join the billions
of IoT devices proliferating our world. However, such capabilities can also be
used to transform smart locks into fingerprint harvesters that compromise an
individual's security without their knowledge. We have named this the droplock
attack. This paper demonstrates how the harvesting technique works, shows that
off-the-shelf smart …
More from arxiv.org / cs.CR updates on arXiv.org
One-shot Empirical Privacy Estimation for Federated Learning
1 day, 5 hours ago |
arxiv.org
Transferability Ranking of Adversarial Examples
1 day, 5 hours ago |
arxiv.org
A survey on hardware-based malware detection approaches
1 day, 5 hours ago |
arxiv.org
Explainable Ponzi Schemes Detection on Ethereum
1 day, 5 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Cyber Security Architect - SR
@ ERCOT | Taylor, TX
SOC Analyst
@ Wix | Tel Aviv, Israel
Associate Director, SIEM & Detection Engineering(remote)
@ Humana | Remote US
Senior DevSecOps Architect
@ Computacenter | Birmingham, GB, B37 7YS