We take it for granted that our mobile devices are helpful, brightening our lives, making us feel warm, fuzzy, connected and safe. Our devices let us know that the temperature is dropping and that it is closing the windows. What does this RF data look like, how easy is it to view and how much of it is sent to the manufacturer or third parties with implicit use of the app?
After a few war driving and capture the flag competitions, Keya changed careers from an itinerant filmmaker and teacher to working within the realm of cyber security. When Keya isn't conducting security audits, information systems assessments, Wi-Fi assessments, pentests, network monitoring, or probing security controls, she's outside exploring.