Title Published Date System Number of Articles Actions
Cyberattack Halts Honda Production at Multiple Plants. 2017-06-20 1. Car inspection system [102012] 2. Computer network [60907] 2 View Details
Smart Gun Security Vulnerabilities Exposed by Hacker 'Plore' 2017-07-24 1. Armatix IP1 smart gun security mechanisms [61033, 61344] 2. Armatix IP1 smart gun radio signal authentication system [61033, 61344] 3. Armatix IP1 smart gun firing pin locking mechanism [61033, 61344] 2 View Details
Cyberattacks Targeting Critical Infrastructure in Energy Sector. 2017-07-06 1. Scada systems [61048] 1 View Details
Pokémon Go Fest 2017: Network Overload Causes Unplayable Game Experience 2017-07-22 1. Mobile phone networks [61095] 2. Servers and technical issues [61493] 2 View Details
Segway MiniPro Electric Scooter Vulnerable to Remote Hacking Incident 2017-07-19 1. Segway MiniPro app's Bluetooth communication system failed to properly authenticate commands, allowing unauthorized access to the scooter [Article 61279]. 2. Segway MiniPro's software update platform lacked a mechanism to confirm the integrity of firmware updates, enabling the installation of malicious firmware updates [Article 61279]. 3. The GPS feature "Rider Nearby" in the Segway MiniPro app provided a tool for potential abuse through publicly available, persistent location tracking, leading to its discontinuation [Article 61279]. 1 View Details
Broadcom Wi-Fi Chip Vulnerability Leads to Smartphone Hacking Incident 2017-07-27 1. Broadcom Wi-Fi chip module in iPhones and most modern Android devices [61282] 1 View Details
Vulnerabilities in Radioactivity Detection Systems at Nuclear Facilities. 2017-07-26 1. Radioactivity sensor at nuclear power facilities 2. Gate monitoring system sold by Ludlum 3. Mirion transceiver and sensor device used in nuclear facilities [61274] 1 View Details
Amazon Echo Vulnerability Allows Remote Eavesdropping via Malware. 2017-08-01 1. Amazon Echo devices sold before 2017 [61277] 1 View Details
Cloak & Dagger Android Vulnerability Exposes Users to Attacks 2017-07-27 1. Android operating system versions up to 7.1.2 2. Android permissions SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE 3. Google Play Protect 4. Google Play Store 5. Cloak & Dagger attack methods 6. User interface design and features of Android 7. Backward compatibility mechanisms in Android 8. Overlays and visual elements manipulation in Android 9. Accessibility services in Android 10. Fragmented version adoption of Android [Cite: <Article 61286>] 1 View Details
Title: "Devil's Ivy IoT Vulnerability in gSOAP Library Impacting Thousands" 2017-07-18 1. gSOAP code widely used in physical security products [61287] 2. ONVIF protocol used by security cameras and other physical security devices [61287] 1 View Details