Research presented at DEF CON shows that attackers can hijack Wi-Fi and Bluetooth-connected speakers to produce damaging sounds. Sound can be damaging to physical health — even lethal. And a hacker can generate sounds that can do damage through common Wi-Fi- and Bluetooth-connected devices, according to a research presentation at DEF CON 27. Matt Wixey,
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
In security, what we don’t look at, don’t listen to, don’t evaluate, and don’t act upon may actually be more important than what we do.