The report is available here. It examines dangerous vulnerabilities across different types of devices and operating systems. Includes an investigation into the security of low-powered Long Range Wide Area Network (LoRaWAN) technology that is widely used in internet of things (IoT) configurations around the world.