![]() We often say that your home network, thought of as a chain of trust, is only as strong as its weakest link, but what if the same were true at the device level? What would that mean? I also bet that I could make that threat persist and present a true danger to any user. ![]() I was asked to prove a myth, call it a suspicion, that the threat to IoT devices is not just to access them via a weak router or exposure to the internet, but that an IoT device itself is vulnerable and can be easily owned without owning the network or the router. ![]() ![]() Some research is so fun that it confirms why I do this work. Follow us on a journey where we show you that firmware is the new software. ![]() While we could, could someone else do it too? As you might expect, the answer is: Yes. We turned a coffee maker into a dangerous machine asking for ransom by modifying the maker’s firmware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |