A short lighthearted description of the issue of trust in Internet of Things products with some of their attached risks.
References
CISOMAG, 2019. Hackers can steal your identity and bank details from a coffee machine!. [Online]
Available at: https://www.cisomag.com/hackers-can-steal-your-identity-and-bank-details-from-a-coffee-machine/
Daws, R., 2019. Hackers attempt to extort $400k in Bitcoin from Ring doorbell owners. [Online]
Available at: https://iottechnews.com/news/2019/dec/13/hackers-extort-400k-bitcoin-ring-doorbell-owners/
Greenberg, A., 2015. Hackers Remotely Kill a Jeep on the Highway—With Me in It. [Online]
Available at: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Khandelwal, S., 2017. Over 8,600 Vulnerabilities Found in Pacemakers. [Online]
Available at: https://thehackernews.com/2017/06/pacemaker-vulnerability.html
Nucleus, 1975. Alleycat. [Sound Recording] (Vertigo).