Scratch Built Smartwatch Looks Pretty Darn Sharp with 3D Printed Case and Round LCD

These days, if you want a smart watch, you’re spoiled for choice. The major smartphone players all have devices on the market, and there’s plenty of third party manufacturers vying for your dollar, too. You might think it’s impossible achieve the same finish with a 3D printer and a reflow …read more

Continue reading Scratch Built Smartwatch Looks Pretty Darn Sharp with 3D Printed Case and Round LCD

Flaws in BLE Chips Expose Millions of Enterprise Wi-Fi APs to Hacking

Security researchers have found two serious vulnerabilities in Bluetooth Low Energy (BLE) chips from Texas Instruments (TI) that are used in millions of Wi-Fi access points, but also in devices from various industries including health care, automotive… Continue reading Flaws in BLE Chips Expose Millions of Enterprise Wi-Fi APs to Hacking

Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack

Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies. Continue reading Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack

It’s Curtains for Blu Chip

In theory, there is no reason you can’t automate things all over your house. However — unless you live alone — you need to consider that most people won’t accept your kludgy looking circuits on a breadboard hanging everywhere. Lighting has become easy now that there are a lot of commercial options. However, there are still plenty of things that cry for automation. For [jeevanAnga], the curtains were crying out for remote control.

Since cellphones are ubiquitous, it makes sense to use the phone as a controller and BlueTooth Low Energy (BLE) is perfect for this kind of application. But …read more

Continue reading It’s Curtains for Blu Chip

Mission Impossible: Infiltrating Furby

Long before things “went viral” there was always a few “must have” toys each year that were in high demand. Cabbage Patch Kids, Transformers, or Teddy Ruxpin would cause virtual hysteria in parents trying to score a toy for a holiday gift. In 1998, that toy was a Furby — a sort of talking robot pet. You can still buy Furby, and as you might expect a modern one — a Furby Connect — is Internet-enabled and much smarter than previous versions. While the Furby has always been a target for good hacking, anything Internet-enabled can be a target for …read more

Continue reading Mission Impossible: Infiltrating Furby

Reverse Engineering A BLE Service To Control A Light Bulb

So, you buy an Internet of Things light bulb, it’s a fun toy that allows you to bathe your environment in pretty colours at the touch of an app, but eventually you want more. You start to wonder how you might do more with it, and begin to investigate its inner workings. Then to your horror you discover that far from having bought a device with a convenient API for you to use, it has an impenetrable closed protocol that defies easy access.

This was the problem facing [Ayan Pahwa] when he bought a Syska Smartlight Rainbow LED bulb, and …read more

Continue reading Reverse Engineering A BLE Service To Control A Light Bulb

crackle – Crack Bluetooth Smart Encryption (BLE)

crackle is a tool to crack Bluetooth Smart Encryption (BLE), it exploits a flaw in the pairing mechanism that leaves all communications vulnerable to decryption by passive eavesdroppers. crackle can guess or very quickly brute force the TK (temporary k… Continue reading crackle – Crack Bluetooth Smart Encryption (BLE)

Google Adds Security Key Enforcement to G Suite Apps, Hosted S/MIME to Gmail

Google pumped more life into the use of physical keys as a second form of authentication when it added Security Key enforcement support to G Suite. Continue reading Google Adds Security Key Enforcement to G Suite Apps, Hosted S/MIME to Gmail