2016 Cybersecurity Predictions – #8: Breaches Come to the IoT Frontier

Hijacked Firmware Assaults the Internet of Things: When a hacker hijacks a laptop, generating sure destructive code stays on the machine is the prepare. Nonetheless, hijacking the Internet of Things (IoT) is a various tale. Most IoT gadgets don’t have neighborhood storage and have few resources, so obtaining code to stick includes modifying the firmware. Next yr, we assume to see evidence-of-idea attacks that permanently modify and hijack the firmware of IoT products. In response, we hope to see distributors get started to harden and protection IoT products by applying secure boot mechanisms that make it more tricky for attackers to modify firmware. We endorse sellers get in entrance of this discovering curve.

(Visited 10 times, 1 visits today)

You Might Be Interested In

LEAVE YOUR COMMENT

Your email address will not be published.