<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IoT Device Security in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3264#M2904</link>
    <description>Simply put, Marai attacked IoT devices by using default passwords. Reaper does not look at that, but instead is using 9 different vulnerabilities to gain access. Interesting thing about reaper is its size, last I heard it waa aomething like 20x the size of Marai. Thus far, I have not heard of any recorded attacks from reaper.</description>
    <pubDate>Fri, 03 Nov 2017 02:17:17 GMT</pubDate>
    <dc:creator>LewisM</dc:creator>
    <dc:date>2017-11-03T02:17:17Z</dc:date>
    <item>
      <title>IoT Device Security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3261#M2903</link>
      <description>&lt;P&gt;Marai was just the beginning of the large scale attacks on IoT devices.&amp;nbsp; Has anyone heard the news about "Reaper" or know the differences and similarities between the two attack vectors used?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2017 01:26:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3261#M2903</guid>
      <dc:creator>hodged</dc:creator>
      <dc:date>2017-11-03T01:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: IoT Device Security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3264#M2904</link>
      <description>Simply put, Marai attacked IoT devices by using default passwords. Reaper does not look at that, but instead is using 9 different vulnerabilities to gain access. Interesting thing about reaper is its size, last I heard it waa aomething like 20x the size of Marai. Thus far, I have not heard of any recorded attacks from reaper.</description>
      <pubDate>Fri, 03 Nov 2017 02:17:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3264#M2904</guid>
      <dc:creator>LewisM</dc:creator>
      <dc:date>2017-11-03T02:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: IoT Device Security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3278#M2905</link>
      <description>&lt;P&gt;Both are ways to attack IoT devices and to create botnets. It seems more and more IoT botnets are to be created, as IoT seem to be the "weakest link" in security nowadays.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2017 09:30:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3278#M2905</guid>
      <dc:creator>Romualds</dc:creator>
      <dc:date>2017-11-03T09:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: IoT Device Security</title>
      <link>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3282#M2906</link>
      <description>&lt;P&gt;The 'S' in IoT stands for Security.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2017 10:28:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/IoT-Device-Security/m-p/3282#M2906</guid>
      <dc:creator>str12</dc:creator>
      <dc:date>2017-11-03T10:28:55Z</dc:date>
    </item>
  </channel>
</rss>

