This consulting firm focuses on the internet of things and protecting wireless devices in the workplace. With the rise of IoT concerns, the blog offers an excellent entrance into the types of threats and issues facing companies.
When thinking about a botnet, it’s helpful to visualize it as an army of connected devices. The army comparison works here because botnets are a collection of individual devices working together as a single unit.
With the thump of techno all around us and traces of network traffic on giant screens providing the only light, the Pwnie Express team spent the tail end of July in the Black Hat Network Operations Center (NOC). Before continuing to read this post, put your headphones on and blast The Prodigy's Voodoo People with your lights off and you'll start to feel the vibe. But the feeling of tackling IoT security in such an intense and dynamic network environment is something that's a bit more difficult to capture.
All of these attacks have similarities in terms of attack strategies, and a shift in focus to operational business disruption vs. data theft as the goal or leverage for monetizing the attack.
First, the Mirai botnet, in late 2016, affected internet access for some hundreds of thousands of systems. The attack vector focused on home consumer devices, items that typically aren’t really configured securely, or administrated professionally. Home routers and IP-connected video cameras were exploited, but the public suffered. It was a prime example of the principle of interconnectedness goes both ways: like other powerful technologies, it can be either extremely useful or deeply damaging, depending on how it is used.
Not all hackers are bad guys. After all, a hacker is simply someone who figures how to repurpose a tool, a gadget, or a device to carry out a task the object wasn’t designed to do. Steve Wozniak was a hacker before he co-created Apple. Tesla, Turing, and DaVinci, are all hackers in their own right.
NTIA Meets on IoT Security as Vigilantes Take Action
Today in Washington, the National Telecommunications and Information Administration will hold its third meeting to discuss Internet of Things (IoT) Security Upgradability and Patching. We’ll be watching the conversation to see if the stakeholders panel has any progress to report. We are seeing that the threats from competing strains of malware coupled with limited patching capabilities by vendors is making the danger posed by unsecured IoT products even greater.
Read Full Article
Read for later
Articles marked as Favorite are saved for later viewing.
Scroll to Top
Separate tags by commas
To access this feature, please upgrade your account.