To build a safer more connected tomorrow we are going to have to change how we build devices today. This post explores four ways our industry can attack the issue of IoT device security.
Inside Out: The Shrinking Air Gap
The IoT Spin Cycle
For the uninitiated, an attacker over the network or Internet can use a web browser to download the file that stored the dishwasher’s passwords. Tools to then crack the passwords are freely available. Following that, in theory the attacker can then login to the dishwasher and cause it to do their nefariously sudsy bidding.