EP 52: Hacking Cellular-Enabled IoT Devices
Update: 2024-12-20
Description
Podcast: Error Code (LS 27 · TOP 10% what is this?)
Episode: EP 52: Hacking Cellular-Enabled IoT Devices
Pub date: 2024-12-18
Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization

The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Episode: EP 52: Hacking Cellular-Enabled IoT Devices
Pub date: 2024-12-18
Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization

This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.
The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Comments 
In Channel





![Medical Device Cybersecurity Is Tricky [The Industrial Security Podcast] Medical Device Cybersecurity Is Tricky [The Industrial Security Podcast]](https://cdn-images-3.listennotes.com/podcasts/the-industrial-security-podcast-pi-media-Hj0wnqx_vW5-K5gXeFuzZ1S.1400x1400.jpg)







