cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Showing results for 
Search instead for 
Did you mean: 
Advocate I

Unsecured IoT

Microsoft made news at last weeks Black Hat conference, generating a lot of buzz about its "discovery" of a malicious Russian hacker group "Strontium" using common IoT devices to carry out widespread attacks on corporate networks. Here's a list of 8 common vulnerabilities that are often found in IoT device firmware:

 

  1. Unauthenticated access
  2. Weak authentication
  3. Hidden backdoors
  4. Password hashes
  5. Encryption keys
  6. Buffer overflows
  7. Open source code
  8. Debugging services