Embedded devices with vulnerable hard-coded encryption keys continue to proliferate, warn researchers

clock • 2 min read

The 'internet of insecure things' to become even more insecure after SEC-Consult dumps data on Github

The number of embedded devices "secured" with potentialy vulnerable hard-coded encryption keys is increasing at a faster rate now than when the problem was first highlighted in November last year. ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Haier threatens legal action over open source appliance control plugin

Internet of Things

Haier claims the plugin is causing ‘significant economic harm’

clock 23 January 2024 • 2 min read
Why is CCTV IT's blind spot?

Internet of Things

CCTV is no longer an isolated and passive component

clock 18 April 2023 • 2 min read
Strava fitness app used to spy on Israeli military officials

Threats and Risks

The flaw has also exposed the locations of a number of sensitive sites in the country.

clock 21 June 2022 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Vanta: Cybersecurity spend should be 30% of the IT budget

Vanta: Cybersecurity spend should be 30% of the IT budget

Currently it's 9% in the UK

clock 03 May 2024 • 4 min read
Security Excellence Awards – winners revealed!

Security Excellence Awards – winners revealed!

The technologies, projects, partners and people leading the way in cybersecurity

clock 03 May 2024 • 2 min read
Next's CISO: Learn from attackers to boost cyber defences

Next's CISO: Learn from attackers to boost cyber defences

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

Tom Allen
clock 02 May 2024 • 4 min read