Posts Tagged ‘vulnerabilities’

SexTech: Characteristics of Smart Sex Toys (ESET White Paper)

Monday, March 15th, 2021

Did you know that sex toys could be connected to the Internet, to a smartphone or to another sex toy? Along with the technology that makes sex toys smart, vulnerabilities are introduced that could endanger the user’s data, privacy and even safety!

Architecture of a smart sex toy.

Architecture of a smart sex toy.

With the emergence of the IoT, many manufacturers have entered the sexual pleasure market by integrating the ability to control devices through mobile apps as well as adding web-based interconnectivity.

There are currently numerous different apps available, each of which offers the ability to control a wide range of models.

In terms of their architecture, most of these devices can be controlled via Bluetooth Low Energy (BLE) from an app installed on a smartphone.

The main advantages of this protocol are that it has very low power requirements, communications are within an acceptable range, there is interoperability among chipset manufacturers, and it all comes in a very compact size.

As a result, a lot of smart devices for the home, health, car, and even sex toy fields, use BLE between the device and the app that controls it.

Like Bluetooth, BLE operates on the 2.4 GHz ISM band.

However, unlike standard Bluetooth, BLE stays in sleep mode all the time, except when a connection is initiated.

Also, the actual connection times themselves are just a few milliseconds, unlike Bluetooth, which takes more than 100 milliseconds.


Palo Alto Networks on protection against IE vulnerabilities

Sunday, July 20th, 2014

Earlier this month, Palo Alto Networks discovered ten critical vulnerabilities in Internet Explorer browsers, underlining the importance for businesses to focus on knowing the risk of running vulnerable software.

Check out five core concepts on how to protect your organisation against vulnerabilities.

Check out five core concepts on how to protect your organisation against vulnerabilities.

Sharat Sinha – Vice President, Asia Pacific for Palo Alto Networks – shares his views on how businesses and organisations can protect themselves against malicious attacks and avoid compromises to their network security.

Below are Sinha’s views.