
Insights into IoT and cybersecurity from experts at NewSky Security.
👩💻 👨💻 Recent Blogs
🔍💡 IoT Threat Research
👩💻 👨💻 All Blogs
1-100 of 285 results
-
What is the acronym OWASP?
- General
- IoT
When reading articles about mobile security, you may have come across the acronym OWASP and… -
Wi-Fi Lighting
- Security
LIFX The LIFX Original is a Wi-Fi Smart LED White Light Bulb that gives you… -
Smart Irrigation Controllers
- Security
Aifro WaterEco Aifro WaterEco is a smart garden sprinkler system with a 7-inch touch screen…. -
Medical & Fitness
- Security
AdhereTech AdhereTech makes smart, wireless pill bottles that help ensure that patients are taking their… -
Jelly Bean
- Security
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:… -
Infostealer.A
- Security
AppRisk Coverage: YesType: TrojanOWASP: M4: Unintended Data LeakageAliases: Trojan:Android/InfoStealer Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
Gingerbread
- Security
AppRisk Coverage: Not ApplicableType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1… -
Ice Cream Sandwich
- Security
AppRisk Coverage: YesType: InformationAliases: Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash:… -
ExymemBrk.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Exploit/ExymemBrk.A Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
DroidKungfu.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Trojan: Android/DroidKungFu.A Backdoor.AndroidOS.KungFu Android/DroidFu Trojan:AndroidOS/DroidKrungFu.A Andr/KongFu-A AndroidOS_DROIDKUNGFU… -
CVE-2015-7888
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Samsung Galaxy S6 Directory Traversal… -
Case Study: Hacking Smart Lock Security
- Security
Update: This case study was presented at the CanSecWest 2016 conference held in Vancouver, British… -
Ashmembrk.A
- Security
AppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: CVE-2011-1149 Platform: AndroidFile size (bytes): Filename: App… -
Certificate Verification Vulnerability
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
CVE-2011-1149
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Ashmembrk.A Platform: AndroidFile size (bytes):… -
CVE-2013-6282
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
CVE-2014-3153
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Towelroot bug Platform: AndroidFile size… -
CVE-2014-4943
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):… -
CVE-2015-1474
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
CVE-2015-1528
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Elevation of Privilege Vulnerability in… -
CVE-2015-3636
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: Android, LinuxFile size (bytes):… -
CVE-2015-3825
- Security
Severity Level: High AppRisk Coverage: Yes Type: Vulnerability OWASP: M4: Unintended Data Leakage Aliases: OpenSSLX509Certificate… -
Health & Fitness
- Security
All the App Icons from this website are from Google Play Store No.1: Fitbit … -
-
MempoDroid.A
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via… -
MempoDroid.C
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Linux Local Privilege Escalation via… -
Weak Random Number Generator
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Platform: AndroidFile size (bytes): N/AFilename:… -
ARS Security Freeze: How to Protect Your Credit from Unauthorized Access
- Uncategorized
If you want to protect your credit report from unwanted access, an ARS security freeze… -
What to do if your SSN is on the Dark Web
- Hacking
Finding out that your Social Security number is on the dark web can be stressful…. -
Who will receive $1800 Social Security Payment in 2025?
- General
You may have heard friends, neighbors, or social-media pundits talk about an “$1,800 Social… -
Kernel Security Check Failure Causes and Effective Troubleshooting Methods
- Security
The kernel security check failure is a common Windows error that causes the system to… -
ecrypto1.com Crypto Security: Comprehensive Analysis and Best Practices
- privacy
When it comes to protecting your digital assets, ecrypto1.com offers a strong and layered approach… -
What Is Composite Risk Management? (Your Complete Guide to CRM Process and Implementation)
- General
You’re leading a project with multiple moving parts—tight deadlines, budget constraints, new technology, and a… -
What Does “GNG” Mean on TikTok and Instagram? (Your Guide to This Trending Abbreviation)
- General
You’re scrolling through TikTok comments or Instagram DMs when you spot it again: “GNG.” Maybe… -
Kyocera Default Passwords Command Centre
Kyocera machine passwords: General rules 1. Most machines have a username and password to enter… -
IoT Security Concerns in 2025: What Every Business Leader Needs to Know
- IoT
After spending years in the trenches of IoT security at NewSky Security, I’ve witnessed firsthand… -
The Best Website Databases in 2025: A Quick Guide to Modern Data Architecture
- General
After architecting and securing database solutions for countless web applications at NewSky Security, I’ve witnessed… -
-
Is a Cybersecurity Hard? The Truth About Working in This Industry
- Career
As someone who’s spent the last 15 years building and leading cybersecurity teams, I get… -
What is GRC in Cyber Security? A Straightforward Explanation
- Security
As a cybersecurity executive who’s implemented GRC programs across multiple organizations, from Microsoft to my… -
Are smart locks secure? -Hacking smart locks
- General
Smart locks are no exception to this IoT trend and have become popular with homeowners…. -
IoT In The News: Uconnect Hack
- IoT
- Black Hat
- Hacking
- mobile
In July, it was revealed that two researchers, Charlie Miller and Chris Valasek, were able… -
Critical Stagefright flaw, millions affected
- IoT
- Android
- Black Hat
- Hacking
- privacy
In late July, researchers with Zimperium announced the discovery of a critical flaw in the… -
OBD Case Study: Gone in 6 Seconds
- IoT
- Android
History Prior to the 1980s, vehicle diagnostics were more hands-on, and on-board computers were not fully… -
Popular anonymous SNS app leaking user id, geo location, etc
- General
The following blog post describes a popular anonymous SNS app in China, pyyx, which leaks… -
Raising the bar in Mobile Security
- General
- Press
Today we announce our partnership with West Coast Labs, a leading certification firm in the… -
Removing Android ransomware from my tv
- IoT
- Android
- Malware
In July, you may have read how I unwittingly installed Android ransomware to my HiMedia… -
Will AI Become Advanced Enough to Write Good Application Essays?
- Uncategorized
AI technology is rapidly advancing and will likely become sophisticated enough to write compelling application… -
The 10 Most Important AI Research Papers of All Time
- AI
The field of artificial intelligence has been shaped by groundbreaking research papers that introduced revolutionary… -
Stagefright scan and removal tool
- Hacking
- Android
- Black Hat
- Malware
0xID Labs has created a utility to scan for and remove malformed media files that… -
Information Archives
- Security
Search for: Information Eclair Marshmallow Lollipop KitKat Jelly Bean Ice Cream Sandwich Gingerbread Froyo Exploit -
Stagefright Vulnerabilities
- Security
Severity Level: HighAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases:Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
Vulnerability Archives
- Security
Search for: Vulnerability Weak Random Number Generator CVE-2015-6610 CVE-2015-6611 Certificate Verification Vulnerability CVE-2015-1474 CVE-2015-7888 CVE-2015-3825… -
Marshmallow
- Security
AppRisk Coverage: YesType: InformationAliases:Platform: AndroidFile size (bytes): N/AFilename: N/AApp title: N/AMD5 Hash: N/ASHA1 hash: N/AAffected… -
Top IoT Devices in the Market
- Security
Oxford defines the Internet of Things as: “A proposed development of the Internet in which… -
Smart Home System
- Security
Elgato Eve This line of home automation products works with Apple HomeKit to allow users… -
CVE-2015-1538
- Security
Severity Level: High AppRisk Coverage: Yes Type: Vulnerability Aliases: Android-20139950 Stagefright vulnerability Platform: Android File… -
Malware Archives
- Security
Search for: Malware Worm Darlloz.A Exploit MempoDroid.C MempoDroid.A MasterKey.B MasterKey.A Stagefright Vulnerabilities Lvedu.B… -
CVE-2015-3826
- Security
Severity Level: HighAppRisk Coverage: NoType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size… -
CVE-2015-3824
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityAliases: Stagefright vulnerability Platform: AndroidFile size (bytes): N/AFilename: N/AApp title:… -
Knowledgebase Archive – Page 2 of 5
- Security
Search for: Information Malware Worm Exploit Trojan Vulnerability -
CVE-2015-3829
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size… -
CVE-2015-3864
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size… -
Analysis for Top Apps in Google Play
- Security
Nowadays, smart phone has become a daily essential for our modern lives, and we tend… -
CVE-2015-1539
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityAliases: Android-20139950 Stagefright vulnerability Platform: AndroidFile size (bytes): N/AFilename: N/AApp… -
MasterKey.A
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Master Key vulnerability Platform: AndroidFile… -
MasterKey.B
- Security
Severity Level: MediumAppRisk Coverage: YesType: ExploitOWASP: M4: Unintended Data LeakageAliases: Master Key vulnerability Platform: AndroidFile… -
Exploit Archives
- Security
Search for: Exploit MempoDroid.C MempoDroid.A MasterKey.B MasterKey.A Stagefright Vulnerabilities Lvedu.B Lvedu.A ExymemBrk.A DroidKungfu.A DiutesEx.B… -
CVE-2015-3828
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Platform: AndroidFile size… -
CVE-2015-6602
- Security
Severity Level: HighAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Stagefright vulnerability Stagefright 2.0 Platform:… -
CVE-2013-4787
- Security
Severity Level: MediumAppRisk Coverage: YesType: VulnerabilityOWASP: M4: Unintended Data LeakageAliases: Master Key vulnerability Platform: AndroidFile… -
How to turn off VPN on Iphone’s
- VPN
Turning off a VPN on an iPhone is a straightforward process that gives you back… -
Our New Sky Security Annual Retreat: A Lesson in Cybersecurity and…Cleanliness?
- General
What a week! The New Sky Security team just got back from our annual corporate… -
Enhance Your Security Posture with Cyber Security Monitoring
- Security
In today’s digital landscape, the importance of cyber security monitoring cannot be overstated. Organizations face… -
Postgres & SupaBase Row Level Security
- Database
SupaBase which uses PostgreSQL’s Row-Level Security (RLS) are powerful database feature that gives administrators precise… -
Cyber Security Private Investigations
- Services
When your in trouble and you want to keep it extremely private. We are the… -
Write for Us: Share Your Expertise in IoT
- General
Are you passionate about the Internet of Things (IoT) and looking to contribute to the… -
Private Investigations Write for Us: We Want Your Submissions
- General
Welcome to our blog dedicated to Private Investigations enthusiasts and experts. We are looking for… -
Cyber Security Write for Us: A Guide for Contributors
- General
Welcome to our platform dedicated to cybersecurity enthusiasts and experts. We are looking for high-quality… -
Write for Us: Contribute Your SaaS Insights
- General
Are you a tech-savvy marketer looking for guest blogging opportunities? We invite you to write… -
Critical RCE in DataWeave: Unpacking CVE-2025-46785 “Weaver’s Loom”
- General
Heads up, developers and security pros! 📢 A critical unauthenticated remote code execution (RCE) vulnerability… -
PoC Included: CVE-2025-27007 Path Traversal in LogStreamer
- General
A high-severity unauthenticated path traversal vulnerability has been found in the LogStreamer log management platform…. -
Critical Auth Bypass in MomentumDB (CVE-2025-31207)
- General
A critical authentication bypass vulnerability has been discovered in the MomentumDB in-memory database platform. Tracked… -
Critical Tenant Isolation Bypass in Gatewayd Ingress Controller (CVE-2025-21587)
- General
A high-severity security bypass and tenant isolation vulnerability has been discovered in the Gatewayd Ingress… -
Critical SQL Injection in TitanTransfer MFT (CVE-2025-29803)
- General
A high-severity second-order SQL injection vulnerability has been discovered in the TitanTransfer Managed File Transfer…







