UK enacts IoT cybersecurity law

The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure policy… Continue reading UK enacts IoT cybersecurity law

LG smart TVs may be taken over by remote attackers

Bitdefender researchers have uncovered four vulnerabilities in webOS, the operating system running on LG smart TVs, which may offer attackers unrestricted (root) access to the devices. “Although the vulnerable service is intended for LAN access o… Continue reading LG smart TVs may be taken over by remote attackers

The Tech Needed to Survive This Decade’s ‘Seismic’ APAC B2B Trends

From generative AI and virtual prototyping to the Internet of Things, blockchain and data analytics, Merkle has predicted that four shifts in the business-to-business market will shape tech buying appetites. Continue reading The Tech Needed to Survive This Decade’s ‘Seismic’ APAC B2B Trends

Security Vulnerability in Saflok’s RFID-Based Keycard Locks

It’s pretty devastating:

Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. The Saflok systems are installed on 3 million doors worldwide, inside 13,000 properties in 131 countries. By exploiting weaknesses in both Dormakaba’s encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock. Their technique starts with obtaining any keycard from a target hotel—say, by booking a room there or grabbing a keycard out of a box of used ones—then reading a certain code from that card with a $300 RFID read-write device, and finally writing two keycards of their own. When they merely tap those two cards on a lock, the first rewrites a certain piece of the lock’s data, and the second opens it…

Continue reading Security Vulnerability in Saflok’s RFID-Based Keycard Locks

MWC Barcelona 2024: Telecom Giants Form Alliance To Promote AI Capabilities

Enterprise news highlights from Mobile World Congress 2024 include novel AI and 5G capabilities, concept laptops and phones. Continue reading MWC Barcelona 2024: Telecom Giants Form Alliance To Promote AI Capabilities