Jace
Neutral
}}Level{2} Experience{-210} Level-II{2} Experience-II{-218} Level-III{1} Experience-III{-344} Level-IV{1} Experience-IV{-348}
Vigilance is my Sword
Posts: 223
|
Post by Jace on Aug 16, 2013 15:22:54 GMT -5
Yea I know I've alread put this up on Where Humanity has ended up but this story deserves it's own thread. Information security firm Trustwave has reported a potential cyber-attack vector to a device you may have never expected the phrase "security vulnerability" would be applied (other than in reference to the end of a toilet paper roll, that is). In an advisory issued August 1, Trustwave warned of a Bluetooth security vulnerability in Inax's Satis automatic toilet. Functions of the Satis—including the raising and lowering of its lid and operation of its bidet and flushing nozzles—can be remotely controlled from an Android application called "My Satis" over a Bluetooth connection. But the Bluetooth PIN to pair with the toilet—"0000"—is hard-coded into the app. "As such, any person using the 'My Satis' application can control any Satis toilet," the security advisory noted. "An attacker could simply download the 'My Satis' application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner. Attackers could cause the unit to unexpectedly open/close the lid, [or] activate bidet or air-dry functions, causing discomfort or distress to user." Read more at www.liveleak.com/view?i=5eb_1375729341#wJxjgsFZdtUCUIMi.99 arstechnica.com/security/2013/08/holy-sht-smart-toilet-hack-attack/swbhod.proboards.com/thread/2030/where-humanity
|
|