Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates

Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates

Posted on June 19, 2025June 19, 2025 By CWS

Safety researcher Sergei Volokitin has offered findings on {hardware} vulnerabilities found in Xiaomi gadgets, together with the corporate’s S3 smartwatch, throughout a presentation at a significant cybersecurity convention.

The analysis was carried out as a part of a collaborative safety occasion the place researchers and distributors work collectively to establish and tackle machine vulnerabilities.

The safety analysis was carried out in the course of the convention’s “Exhausting Pwn” occasion in November 2024, the place impartial safety researchers gathered to look at varied shopper electronics for potential vulnerabilities.

The occasion, which takes place yearly within the Netherlands and the US, brings collectively safety consultants and machine producers in a collaborative atmosphere targeted on enhancing {hardware} safety.

Throughout the multi-day occasion, researchers have been supplied with professional-grade gear, together with soldering irons, warmth weapons, and oscilloscopes, to conduct their {hardware} evaluation.

The format allows safety consultants to collaborate straight with vendor representatives to establish vulnerabilities and report findings that may improve machine safety.

Xiaomi Smartwatch Hacked

The 2024 occasion particularly featured Xiaomi merchandise, together with Mi Band health trackers, smartwatches, headphones, and different shopper electronics. Earlier years have seen comparable collaborative safety examinations of gadgets from main know-how corporations, together with Meta’s Oculus merchandise and Google’s Nest ecosystem.

Sergei Volokitin, who makes a speciality of low-level safety evaluation and conducts impartial safety analysis alongside bug bounty work and safety consultancy, targeted their consideration on two major Xiaomi gadgets in the course of the occasion.

Initially analyzing an outside digicam system, the researcher found that recorded footage was saved in plain textual content format on the machine’s file system, permitting potential attackers to recuperate video content material.

The digicam evaluation revealed further safety issues past unencrypted storage. The researcher recognized that safety tokens used for backend communication have been saved in accessible places on the machine’s file system.

These tokens may doubtlessly be exploited by attackers who acquire bodily entry to the machine. Each vulnerabilities have been reported to Xiaomi, and the corporate acknowledged the safety findings.

Following the digicam analysis, the safety knowledgeable shifted focus to Xiaomi’s S3 smartwatch, noting that the machine offered attention-grabbing safety challenges on account of its restricted third-party software help.

Fashionable smartwatches, the researcher defined, operate equally to smartphones with restricted capabilities however nonetheless deal with delicate consumer knowledge, together with textual content notifications, calendar info, health and well being metrics, and cost card knowledge for contactless transactions.

The smartwatch additionally helps Bluetooth connectivity for cellphone integration and NFC capabilities for each funds and machine unlocking options with Xiaomi smartphones. This mix of delicate knowledge entry and a number of connectivity choices makes such gadgets engaging targets for safety analysis.

The analysis highlights the rising significance of {hardware} safety in shopper electronics, significantly for gadgets that customers carry day by day and will lose or have stolen.

In contrast to stationary gadgets in safe environments, wearable know-how faces distinctive safety challenges on account of its transportable nature and the delicate private knowledge it shops and processes.

The collaborative method demonstrated at HardPwn represents an business pattern towards proactive safety analysis, the place producers work straight with safety researchers to establish and tackle vulnerabilities earlier than malicious actors can exploit them.

This partnership mannequin permits for accountable disclosure and safety enhancements that profit all customers of those more and more linked gadgets.

Meet the cyber warriors Who Stopped the WannaCry Ransomware assault => Free Reside Webinar

Cyber Security News Tags:coordinates, Find, Hacking, PIN, Point, Smartwatch, Touch, Unlock, Xiaomi

Post navigation

Previous Post: How to Detect SQL Injection Vulnerabilities
Next Post: New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

Related Posts

Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants Cyber Security News
APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures Cyber Security News
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Cyber Security News
Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Cyber Security News
Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Microsoft Outlook’s New Two-Click View for Encrypted Emails Protects From Accidental Exposure Cyber Security News
Critical Vulnerability in BeyondTrust Allows Remote Code Execution Critical Vulnerability in BeyondTrust Allows Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News