An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.
Source: https://threatpost.com/peloton-bike-bug-hackers-control/166960/
Be Aware, Be Safe
An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.
Source: https://threatpost.com/peloton-bike-bug-hackers-control/166960/