smart tv
![IoT cybersecurity law](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29155710/iot_cybersecurity-law-400x200.webp)
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop …
![LG webOS TV](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/09150740/lg-webos-1500-400x200.webp)
LG smart TVs may be taken over by remote attackers
Bitdefender researchers have uncovered four vulnerabilities in webOS, the operating system running on LG smart TVs, which may offer attackers unrestricted (root) access to the …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/05200124/android-2023-2-400x200.jpg)
Backdoored Android phones, TVs used for ad fraud – and worse!
A key monetization mechanism of a sophisticated series of cybercriminal operations involving backdoored off-brand mobile and CTV Android devices has been disrupted, Human …
![If It's Smart, It's Vulnerable book](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/29082305/mikko-book-smart-vulnerable-400x200.jpg)
Introducing the book: If It’s Smart, It’s Vulnerable
All our devices and gadgets are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
Cybersecurity threats and cybercrime trends of 2020
Bitdefender released a report revealing top cybersecurity threats, frequency of threats and cybercrime trends of 2020. “Our 2020 findings depict consumers under constant …
![connected house](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104916/connected-house-400x200.jpg)
Should you trust your smart TV or streaming device?
“Smart” devices might be handy and offer higher quality services, but users should be aware that everything comes with a price. And we’re not talking here …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
Adiantum: A new encryption scheme for low-end Android devices
Google has created an alternative disk and file encryption mode for low-end Android devices that don’t have enough computation power to use the Advanced Encryption …
![Vizio Smart TV](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105126/vizio-watch-400x200.jpg)
Five smart TVs tested for security, privacy issues
As more and more smart TVs are sold worldwide, consumers should be aware of the risks associated with this technology. Consumer Union, a US-based nonprofit organization …
![Vizio Smart TV](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105126/vizio-watch-400x200.jpg)
Vizio smart TVs spied on millions of users without their consent
American company Vizio has decided to settle charges that it installed software on its smart TVs that collected viewing data of some 11 million users without their knowledge …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111951/smart-tv-android-ransomware-400x200.jpg)
Ransomware targets Android smart TVs
If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both …
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114042/mobile-400x200.jpg)
Apple updates its products, fixes iMessages zero-day
On Monday Apple has pushed out updates for its many products: iOS, OS X, OS X Server, Safari, watchOS, tvOS, and Xcode. Of these, the most eagerly awaited was that for iOS, as …
![EZCast](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195317/ezcast-400x200.jpg)
EZCast TV streaming stick leaves home networks vulnerable to attack
Check Point researchers have discovered a vulnerability in the EZCast TV streaming stick that enables hackers to take full control of home networks. EZCast, which has five …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege