
Insights into IoT and cybersecurity from experts at NewSky Security.
👩💻 👨💻 Recent Blogs
🔍💡 IoT Threat Research
👩💻 👨💻 All Blogs
1-100 of 288 results
What is the acronym OWASP?
- General
- IoT
When reading articles about mobile security, you may have come across the acronym OWASP and…Smart Irrigation Controllers
- Security
Aifro WaterEco Aifro WaterEco is a smart garden sprinkler system with a 7-inch touch screen….Medical & Fitness
- Security
AdhereTech AdhereTech makes smart, wireless pill bottles that help ensure that patients are taking their…Jelly Bean
- Security
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:…Infostealer.A
- Security
AppRisk Coverage: YesType: TrojanOWASP: M4: Unintended Data LeakageAliases: Trojan:Android/InfoStealer Platform: AndroidFile size (bytes): N/AFilename: N/AApp…Gingerbread
- Security
AppRisk Coverage: Not ApplicableType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1…Ice Cream Sandwich
- Security
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:…ExymemBrk.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/ExymemBrk.A Platform: AndroidFile size (bytes): N/AFilename: N/AApp…DroidKungfu.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Trojan: Android/DroidKungFu.A Backdoor.AndroidOS.KungFu Android/DroidFu Trojan:AndroidOS/DroidKrungFu.A Andr/KongFu-A AndroidOS_DROIDKUNGFU…CVE-2015-7888
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Samsung Galaxy S6 Directory Traversal…Case Study: Hacking Smart Lock Security
- Security
Update: This case study was presented at the CanSecWest 2016 conference held in Vancouver, British…Ashmembrk.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: CVE-2011-1149 Platform: AndroidFile size (bytes): Filename: App…Certificate Verification Vulnerability
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:…CVE-2011-1149
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Ashmembrk.A Platform: AndroidFile size (bytes):…CVE-2013-6282
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:…CVE-2014-3153
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Towelroot bug Platform: AndroidFile size…CVE-2014-4943
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):…CVE-2015-1474
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:…CVE-2015-1528
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Elevation of Privilege Vulnerability in…CVE-2015-3636
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):…CVE-2015-3825
- Security
Severity Level: High AppRisk Coverage: Yes Type: Vulnerability OWASP: M4: Unintended Data Leakage Aliases: OpenSSLX509Certificate…Health & Fitness
- Security
All the App Icons from this website are from Google Play Store No.1: Fitbit …MempoDroid.A
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via…MempoDroid.C
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via…Weak Random Number Generator
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:…ARS Security Freeze: How to Protect Your Credit from Unauthorized Access
- Uncategorized
If you want to protect your credit report from unwanted access, an ARS security freeze…What to do if your SSN is on the Dark Web
- Hacking
Finding out that your Social Security number is on the dark web can be stressful….Who will receive $1800 Social Security Payment in 2025?
- General
You may have heard friends, neighbors, or social-media pundits talk about an “$1,800 Social…Kernel Security Check Failure Causes and Effective Troubleshooting Methods
- Security
The kernel security check failure is a common Windows error that causes the system to…ecrypto1.com Crypto Security: Comprehensive Analysis and Best Practices
- privacy
When it comes to protecting your digital assets, ecrypto1.com offers a strong and layered approach…What Is Composite Risk Management? (Your Complete Guide to CRM Process and Implementation)
- General
You’re leading a project with multiple moving parts—tight deadlines, budget constraints, new technology, and a…What Does “GNG” Mean on TikTok and Instagram? (Your Guide to This Trending Abbreviation)
- General
You’re scrolling through TikTok comments or Instagram DMs when you spot it again: “GNG.” Maybe…Kyocera Default Passwords Command Centre
Kyocera machine passwords: General rules 1. Most machines have a username and password to enter…IoT Security Concerns in 2025: What Every Business Leader Needs to Know
- IoT
After spending years in the trenches of IoT security at NewSky Security, I’ve witnessed firsthand…The Best Website Databases in 2025: A Quick Guide to Modern Data Architecture
- General
After architecting and securing database solutions for countless web applications at NewSky Security, I’ve witnessed…Is a Cybersecurity Hard? The Truth About Working in This Industry
- Career
As someone who’s spent the last 15 years building and leading cybersecurity teams, I get…What is GRC in Cyber Security? A Straightforward Explanation
- Security
As a cybersecurity executive who’s implemented GRC programs across multiple organizations, from Microsoft to my…Are smart locks secure? -Hacking smart locks
- General
Smart locks are no exception to this IoT trend and have become popular with homeowners….IoT In The News: Uconnect Hack
- IoT
- Black Hat
- Hacking
- mobile
In July, it was revealed that two researchers, Charlie Miller and Chris Valasek, were able…Critical Stagefright flaw, millions affected
- IoT
- Android
- Black Hat
- Hacking
- privacy
In late July, researchers with Zimperium announced the discovery of a critical flaw in the…OBD Case Study: Gone in 6 Seconds
- IoT
- Android
History Prior to the 1980s, vehicle diagnostics were more hands-on, and on-board computers were not fully…Popular anonymous SNS app leaking user id, geo location, etc
- General
The following blog post describes a popular anonymous SNS app in China, pyyx, which leaks…Raising the bar in Mobile Security
- General
- Press
Today we announce our partnership with West Coast Labs, a leading certification firm in the…Removing Android ransomware from my tv
- IoT
- Android
- Malware
In July, you may have read how I unwittingly installed Android ransomware to my HiMedia…Will AI Become Advanced Enough to Write Good Application Essays?
- Uncategorized
AI technology is rapidly advancing and will likely become sophisticated enough to write compelling application…The 10 Most Important AI Research Papers of All Time
- AI
The field of artificial intelligence has been shaped by groundbreaking research papers that introduced revolutionary…Stagefright scan and removal tool
- Hacking
- Android
- Black Hat
- Malware
0xID Labs has created a utility to scan for and remove malformed media files that…Information Archives
- Security
Search for: Information Eclair Marshmallow Lollipop KitKat Jelly Bean Ice Cream Sandwich Gingerbread Froyo ExploitStagefright Vulnerabilities
- Security
Severity Level: HighAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases:Platform: AndroidFile size (bytes): N/AFilename: N/AApp…Vulnerability Archives
- Security
Search for: Vulnerability Weak Random Number Generator CVE-2015-6610 CVE-2015-6611 Certificate Verification Vulnerability CVE-2015-1474 CVE-2015-7888 CVE-2015-3825…Marshmallow
- Security
AppRisk Coverage: YesType: InformationAliases:Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash: N/AAffected…Top IoT Devices in the Market
- Security
Oxford defines the Internet of Things as: “A proposed development of the Internet in which…Smart Home System
- Security
Elgato Eve This line of home automation products works with Apple HomeKit to allow users…CVE-2015-1538
- Security
Severity Level: High AppRisk Coverage: Yes Type: Vulnerability Aliases: Android-20139950 Stagefright vulnerability Platform: Android File…Malware Archives
- Security
Search for: Malware Worm Darlloz.A Exploit MempoDroid.C MempoDroid.A MasterKey.B MasterKey.A Stagefright Vulnerabilities Lvedu.B…CVE-2015-3826
- Security
Severity Level: HighAppRisk Coverage: NoType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size…CVE-2015-3824
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityAliases: Stagefright vulnerability Platform: AndroidFile size (bytes): N/AFilename: N/AApp title:…Knowledgebase Archive – Page 2 of 5
- Security
Search for: Information Malware Worm Exploit Trojan VulnerabilityCVE-2015-3829
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size…CVE-2015-3864
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size…Analysis for Top Apps in Google Play
- Security
Nowadays, smart phone has become a daily essential for our modern lives, and we tend…CVE-2015-1539
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityAliases: Android-20139950 Stagefright vulnerability Platform: AndroidFile size (bytes): N/AFilename: N/AApp…MasterKey.A
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Master Key vulnerability Platform: AndroidFile…MasterKey.B
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Master Key vulnerability Platform: AndroidFile…Exploit Archives
- Security
Search for: Exploit MempoDroid.C MempoDroid.A MasterKey.B MasterKey.A Stagefright Vulnerabilities Lvedu.B Lvedu.A ExymemBrk.A DroidKungfu.A DiutesEx.B…CVE-2015-3828
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size…CVE-2015-6602
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Stagefright 2.0 Platform:…CVE-2013-4787
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Master Key vulnerability Platform: AndroidFile…How to turn off VPN on Iphone’s
- VPN
Turning off a VPN on an iPhone is a straightforward process that gives you back…Our New Sky Security Annual Retreat: A Lesson in Cybersecurity and…Cleanliness?
- General
What a week! The New Sky Security team just got back from our annual corporate…Enhance Your Security Posture with Cyber Security Monitoring
- Security
In today’s digital landscape, the importance of cyber security monitoring cannot be overstated. Organizations face…Postgres & SupaBase Row Level Security
- Database
SupaBase which uses PostgreSQL’s Row-Level Security (RLS) are powerful database feature that gives administrators precise…Cyber Security Private Investigations
- Services
When your in trouble and you want to keep it extremely private. We are the…Write for Us: Share Your Expertise in IoT
- General
Are you passionate about the Internet of Things (IoT) and looking to contribute to the…Private Investigations Write for Us: We Want Your Submissions
- General
Welcome to our blog dedicated to Private Investigations enthusiasts and experts. We are looking for…Cyber Security Write for Us: A Guide for Contributors
- General
Welcome to our platform dedicated to cybersecurity enthusiasts and experts. We are looking for high-quality…Write for Us: Contribute Your SaaS Insights
- General
Are you a tech-savvy marketer looking for guest blogging opportunities? We invite you to write…Critical RCE in DataWeave: Unpacking CVE-2025-46785 “Weaver’s Loom”
- General
Heads up, developers and security pros! 📢 A critical unauthenticated remote code execution (RCE) vulnerability…PoC Included: CVE-2025-27007 Path Traversal in LogStreamer
- General
A high-severity unauthenticated path traversal vulnerability has been found in the LogStreamer log management platform….Critical Auth Bypass in MomentumDB (CVE-2025-31207)
- General
A critical authentication bypass vulnerability has been discovered in the MomentumDB in-memory database platform. Tracked…Critical Tenant Isolation Bypass in Gatewayd Ingress Controller (CVE-2025-21587)
- General
A high-severity security bypass and tenant isolation vulnerability has been discovered in the Gatewayd Ingress…Critical SQL Injection in TitanTransfer MFT (CVE-2025-29803)
- General
A high-severity second-order SQL injection vulnerability has been discovered in the TitanTransfer Managed File Transfer…







