One day, everything will be buttonless. Nobody will ever need to grab the remote to turn on the television or hit a switch to kill the lights. These devices will just do what they’re supposed to, all by themselves, without any physical prompts from the user.
Toy firm Vtech has updated its terms and conditions, transferring the blame on future breaches to their users. In light of this, what can you do when you're dealing with a product that admits to having weak security?
Understanding the ecosystem of hardware, software, and services used in each organization’s network, the data/telemetry collected and sent outside it, as well as the challenges caused by the emergence of the Internet of Things (IoT).