![]() ![]() ![]() Let’s say you have an IoT device that is well protected with functions that can be accessed through a well-defined API even if you can control the device through the API, you probably can’t do too much harm. We often say that your home network, thought of as a chain of trust, is only as strong as its weakest link, but what if the same were true at the device level? What would that mean? I also bet that I could make that threat persist and present a true danger to any user. I was asked to prove a myth, call it a suspicion, that the threat to IoT devices is not just to access them via a weak router or exposure to the internet, but that an IoT device itself is vulnerable and can be easily owned without owning the network or the router. Some research is so fun that it confirms why I do this work. Follow us on a journey where we show you that firmware is the new software. While we could, could someone else do it too? As you might expect, the answer is: Yes. We turned a coffee maker into a dangerous machine asking for ransom by modifying the maker’s firmware. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |