As the IoT continues to become more integrated into enterprise and home spaces, the threat landscape also expands. We look at the most significant threats and vulnerabilities in IoT devices on the edge of the network, within the network itself.
A couple discovered that their Nest security system was hacked after their thermostat was repeatedly set to high temperatures despite being adjusted and the hacker started talking to them via the camera.
Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.
Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.