/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Entity

affected devices

4 articles decelerating
Articles
4
mentions
Velocity
-50.0%
growth rate
Acceleration
-1.500
velocity change
Sources
3
publications

Coverage Timeline

2020-02-23
Wired 4 related

Researchers detail “SweynTooth” bugs, which could allow hackers in radio range to crash Bluetooth Low Energy-based devices like pacemakers and fitness trackers

in this case more than 480 of them. https://www.wired.com/... Aaron Miri / @aaronmiri : “For all of these affected devices, they either won't be patched at all or will require huge effort to be update...

2019-03-27
Motherboard 12 related

ASUS confirms its software update tool has been targeted by Advanced Persistent Threat attacks, releases tool to identify “small number” of affected devices

Caroline Haskins / Motherboard :

2019-03-26
Motherboard 4 related

ASUS confirms its software update tool has been targeted by Advanced Persistent Threat attacks, releases tool to identify “small number” of affected devices

A press release released by ASUS this morning confirms Motherboard's reporting.  —  Yesterday, Motherboard revealed …

2015-03-23
SecurityWeek 6 related

Cisco IP Phones Vulnerable to Eavesdropping

Some of the IP phones designed by Cisco for small businesses are plagued by a vulnerability that allows a remote attacker to eavesdrop on conversations and make phone calls from affected devices, the ...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...