35 Manufacturers and consumers need better guidelines about what kind of information is collected and transmitted from these devices and how such communications can be managed and protected. The potential for attacking these WAPs exists, as illustrated in the well-publicized Jeep hack demonstration in 2015. Onboard vehicle controls, embedded medical devices, smart clothing and household appliances, and ICS are just some of the use cases that comprise the IoT (or as some have suggested, the Internet of Threats). Jennifer Ann Kurtz, in Hacking Wireless Access Points, 2017 Attack Strategy: IoT
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |