A short lighthearted description of the issue of trust in Internet of Things products with some of their attached risks.
CISOMAG, 2019. Hackers can steal your identity and bank details from a coffee machine!. [Online]
Available at: https://www.cisomag.com/hackers-can-steal-your-identity-and-bank-details-from-a-coffee-machine/
Daws, R., 2019. Hackers attempt to extort $400k in Bitcoin from Ring doorbell owners. [Online]
Available at: https://iottechnews.com/news/2019/dec/13/hackers-extort-400k-bitcoin-ring-doorbell-owners/
Greenberg, A., 2015. Hackers Remotely Kill a Jeep on the Highway—With Me in It. [Online]
Available at: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Khandelwal, S., 2017. Over 8,600 Vulnerabilities Found in Pacemakers. [Online]
Available at: https://thehackernews.com/2017/06/pacemaker-vulnerability.html
Nucleus, 1975. Alleycat. [Sound Recording] (Vertigo).