From 521c1f83e2b720718ae31e57a9969806dd5d4cda Mon Sep 17 00:00:00 2001 From: Vijay Janapa Reddi Date: Mon, 18 Nov 2024 14:24:21 -0500 Subject: [PATCH] Fix broken reference link --- contents/core/privacy_security/privacy_security.qmd | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contents/core/privacy_security/privacy_security.qmd b/contents/core/privacy_security/privacy_security.qmd index 22359825..69bb8fca 100644 --- a/contents/core/privacy_security/privacy_security.qmd +++ b/contents/core/privacy_security/privacy_security.qmd @@ -393,7 +393,7 @@ An interface becomes "leaky" when it exposes more information than it should, of * **Pacemakers:** Interface vulnerabilities were discovered in some [pacemakers](https://www.fda.gov/medical-devices/medical-device-recalls/abbott-formally-known-st-jude-medical-recalls-assuritytm-and-enduritytm-pacemakers-potential) that could allow attackers to manipulate cardiac functions if exploited. This presents a potentially life-threatening scenario. -* **Smart Lightbulbs:** A researcher found he could access unencrypted data from smart lightbulbs via a debug interface, including WiFi credentials, allowing him to gain access to the connected network [@dhanjani2015abusing]. +* **Smart Lightbulbs:** A researcher found he could access unencrypted data from smart lightbulbs via a debug interface, including WiFi credentials, allowing him to gain access to the connected network [@greengard2021internet]. * **Smart Cars:** If left unsecured, The OBD-II diagnostic port has been shown to provide an attack vector into automotive systems. Attackers could use it to control brakes and other components [@miller2015remote].