Articles tagged with "IoT-security"
5.56 mm drone-killer bullets turn any gun into an air defense weapon
The United States is testing specialized 5.56×45 mm anti-drone bullets designed to transform standard assault rifles into effective close-range drone-killing weapons. These rounds, which require no modifications to existing rifles such as the AR-15 or SIG MCX, fire multiple projectiles that spread out over distance, increasing the likelihood of hitting and disabling key drone components like rotors and engines. The bullets create a destruction zone that expands with range, allowing ground troops to counter UAV threats efficiently and affordably compared to more complex systems like lasers or electronic warfare equipment. The tested rounds, produced by Drone Round, offer a lightweight, cost-effective, and easily deployable solution for infantry and security forces. This concept is not entirely new, as Ukraine had earlier developed and tested similar 5.56 mm anti-drone rounds amid the ongoing conflict with Russia, where drone usage has surged dramatically. Ukrainian forces equipped their soldiers with custom warheads that burst upon firing, dispersing fragments to neutralize fast-moving
drone-technologyanti-drone-weaponsUAV-defenseroboticsmilitary-technologyIoT-securityunmanned-aerial-vehiclesRivian spinoff Also reveals a high-end modular e-bike for $4,500
Rivian’s spinoff company Also has unveiled a high-end modular electric bike called the TM-B, designed as more than just a conventional e-bike. Developed initially by a skunkworks team within Rivian, Also aims to build the entire micromobility platform in-house, including hardware, software, and manufacturing tools. The TM-B features a sleek design with hidden advanced technology such as a pedal-by-wire propulsion system that disconnects pedaling from mechanical movement, a removable battery with USB-C fast charging, and integrated security that locks the bike and alerts the rider if tampered with. The TM-B will be available in several trims: a $4,500 launch edition and performance trim (both with a 100-mile range, 10 assist levels, air suspension, and multiple ride modes), and a base model priced under $4,000 with a 60-mile range and fewer assist levels. All versions include front and rear LED lighting with turn signals, a top speed of
energyelectric-bikebattery-technologymicromobilityIoT-securitymodular-designelectric-vehicleSatellites found exposing unencrypted data, including phone calls and some military comms
Security researchers from UC San Diego and the University of Maryland have uncovered that up to half of all geostationary satellites are transmitting sensitive consumer, corporate, and military data without encryption. Using an off-the-shelf satellite receiver over a three-year period, they intercepted unencrypted information including private phone calls, text messages, in-flight Wi-Fi internet traffic, and communications from critical infrastructure systems such as energy, water suppliers, and offshore oil and gas platforms. The researchers have spent the past year notifying affected organizations, prompting some, like T-Mobile and AT&T’s Mexican network, to begin encrypting their satellite transmissions. However, many entities, including certain critical infrastructure providers, have yet to secure their data, leaving substantial amounts of satellite communications vulnerable to eavesdropping for the foreseeable future. This ongoing exposure highlights significant security risks in satellite data transmission that require urgent attention.
energysatellite-communicationdata-securitycritical-infrastructureIoT-securitytelecommunicationscybersecurityNew system helps drones recover fast from stealth cyber hijacks
Researchers at Florida International University have developed SHIELD, a novel real-time defense system that enables drones to detect and recover from cyberattacks while still in flight. Unlike traditional defenses that primarily monitor navigation sensors vulnerable to manipulation (such as GPS spoofing), SHIELD continuously scans a drone’s entire control system—including hardware components like battery levels and processor activity—to identify unusual behavior indicative of an attack. Using machine learning models, SHIELD can recognize different attack patterns, detect cyber intrusions within 0.21 seconds, and initiate recovery procedures within 0.36 seconds, allowing the drone to complete its mission rather than terminating it as a fail-safe. This advancement addresses the growing security risks associated with the expanding use of drones across industries such as delivery, agriculture, infrastructure inspection, and disaster response. As regulatory bodies like the Federal Aviation Administration prepare to increase drone operations, SHIELD’s comprehensive approach provides a crucial safety layer by ensuring drones remain reliable and secure even under stealth cyber hijacks. The research team lik
robotdrone-securitycybersecurityIoT-securitymachine-learningreal-time-defenseautonomous-systemsHackers can hijack Unitree humanoid robots via Bluetooth flaw
Security researchers Andreas Markis and Kevin Finnisterre revealed a critical Bluetooth Low Energy (BLE) vulnerability affecting Unitree Robotics’ humanoid and quadruped robots, including the Go2, B2, G1, and H1 models. The flaw, dubbed UniPwn, allows attackers to gain root-level wireless access by exploiting hardcoded encryption keys used in the robots’ BLE setup for WiFi configuration. This weakness enables a single compromised robot to infect others within range, effectively creating a self-propagating botnet. Additionally, the G1 robot was found to transmit data to servers in China every five minutes without user notification, raising further privacy and security concerns. The researchers criticized Unitree Robotics for poor communication regarding these vulnerabilities, questioning whether the issues stem from negligence or intentional design flaws. In response, Unitree acknowledged the problems and stated that most fixes have been completed and will be rolled out soon. Experts recommend disabling Bluetooth connectivity and using only WiFi to connect these robots to mitigate risks
roboticscybersecurityBluetooth-Low-EnergyUnitree-robotsIoT-securityhumanoid-robotsrobot-hackingHow your solar rooftop became a national security issue
The article discusses emerging national security concerns related to residential solar rooftop systems, focusing on vulnerabilities in solar inverters—devices that convert solar energy into usable electricity and connect homes to the power grid. James Showalter, CEO of EG4, highlights a hypothetical but technically possible scenario where an attacker physically accesses a homeowner’s Wi-Fi network and compromises the solar inverter, potentially taking control of the home’s energy system. Although Showalter considers such an attack unlikely, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently disclosed significant security flaws in EG4’s solar inverters. These vulnerabilities include unencrypted communications, lack of firmware integrity checks, and weak authentication, which could allow attackers on the same network to intercept data, install malicious software, or seize control of the inverter. The article underscores that modern solar inverters have evolved from simple power converters into complex, interconnected devices integral to home energy management and grid interaction. With the rapid growth of residential solar installations in the U.S. driven by
energysolar-energycybersecurityIoT-securitysmart-gridsolar-inverterhome-energy-managementAI-powered radar tech can spy on phone calls up to 10 feet away
Researchers at Penn State have developed an AI-powered radar system capable of remotely eavesdropping on phone calls by detecting and decoding subtle vibrations from a cellphone’s earpiece. Using millimeter-wave radar—technology commonly found in self-driving cars and 5G networks—combined with a customized AI speech recognition model adapted from OpenAI’s Whisper, the system can capture and transcribe conversations from up to 10 feet away with approximately 60% accuracy over a vocabulary of up to 10,000 words. This represents a significant advancement from their 2022 work, which could only recognize a limited set of predefined words with higher accuracy. The researchers emphasize that while the transcription accuracy is imperfect, even partial recognition of keywords can pose serious privacy and security risks, especially when combined with contextual knowledge. They liken the system’s capabilities to lip reading, which also relies on partial information to infer conversations. The study highlights the potential misuse of such technology by malicious actors to spy on private phone calls remotely,
AIradar-technologyspeech-recognitionprivacy-risksmillimeter-wave-radarmachine-learningIoT-securityCorsha gets investment from Cybernetix Ventures for robot cybersecurity - The Robot Report
Corsha Inc., a Vienna, Virginia-based company specializing in machine cybersecurity, has secured investment from Cybernetix Ventures as part of its $18 million Series A-1 funding round. Corsha’s platform focuses on securing machine-to-machine (M2M) connections within robotics and industrial automation, addressing a gap where traditional cybersecurity has largely centered on human protection while neglecting operational technology. Founded in 2017, Corsha offers a patented Machine Identity Provider (m-IdP) that provides dynamic, cryptographic machine identities, continuous verification, and automated lifecycle management to ensure secure, authorized connections across cloud, edge, hybrid, and air-gapped environments. The m-IdP platform is designed to support the growing autonomy and interconnectivity of industrial systems by embedding zero-trust principles and enabling secure data movement and automation at machine speed and scale. Cybernetix Ventures highlighted Corsha’s solution as a foundational trust layer critical for the future of connected, autonomous systems, emphasizing the increasing need for
robotcybersecuritymachine-identityindustrial-automationoperational-technologyautonomous-systemsIoT-securityInfinite Machine's e-bike offers 33 mph speed, 40-mile range
Infinite Machine has launched the Olto, a sleek, futuristic electric moped designed specifically for urban commuters and compliant with Class 2 e-bike regulations. The Olto features a metallic body with hidden wiring, full front and rear suspension, and a clean aesthetic. It offers a top speed of 20 mph in standard mode for bike lane use, with an unlocked off-road mode reaching 33 mph. The moped is powered by a removable, UL-certified 48V 25Ah battery providing a real-world range of 40 miles, which can be fast-charged to 50% in one hour or fully charged in three hours. The Olto integrates advanced automotive-level security features, including GPS and LTE tracking, an electronic motor and wheel lock, a steering column lock, and a built-in U-lock mount, all supported by an auxiliary battery to maintain protection even when the main battery is removed. Practical design elements include a long bench seat with hidden footpegs and grab handles for a
electric-bikee-bikebattery-technologyurban-mobilityelectric-vehicleIoT-securityenergy-storage