The device, the app and the cloud, and your development lifecycle isn’t fit enough to catch up Black Hat Asia Wearable devices – and anything that relies on an app to help with configuration – has at least three attack surfaces and your existing secur...
↧