Microsoft made news at last weeks Black Hat conference, generating a lot of buzz about its "discovery" of a malicious Russian hacker group "Strontium" using common IoT devices to carry out widespread attacks on corporate networks. Here's a list of 8 common vulnerabilities that are often found in IoT device firmware:
- Unauthenticated access
- Weak authentication
- Hidden backdoors
- Password hashes
- Encryption keys
- Buffer overflows
- Open source code
- Debugging services