shaving a wide variety of CPU underlying hardware devices, as well as version clutter of operating system platforms, the security implications of IoT devices themselves are almost identical to those faced by the PC era, the internet era IT products, or " same strain ". " It's just the door that's going to get more complicated and troublesome," Mr. Fu Jie, vice president of security products, who borrowed a bang bang. "
Smart camera, smart phone, Smart car ... the hardware platform for IoT terminals has long since gone PC, the internet era is so single, the operating system type is more and more multifarious. This means that hackers need to find the appropriate " pry lock Tool "--intrusion method for different hardware platforms and different operating systems . "The original door may be only a few or more than 10 fans, a set or a few sets of pry-lock tool can be done." But there may be hundreds of doors in the IoT age, and the need for pry-lock tools is more likely to be 10 or more. "
once the door has been opened, survival in the program, the application of hidden security problems and the era of PC and Internet is the same. Early in the year around, Bang Bang security in all kinds of mobile applications to do security detection found that many loopholes, problems, riddled with,"the security of the PC in here one is not less, everything is so old-fashioned." "
as the chain of interest associated with the internet of things becomes large, the " Price/performance " of hacking attacks is increasing , especially when the difficulty of IoT attacks is mostly focused on the " Open Door " segment, Old-fashioned security breaches will further reduce the cost of malicious attacks and induce malicious attackers to gain amazing benefits by launching attacks on the internet of things.
people struggling in the internet of things, when you still put the product performance, user experience in the first place, when you are still amblyopia, ignoring security put it in the remote N position, this means that you have already harvested the fruits of your own," selfless " to " dedicate " to the malicious attackers, and for their can claim " Open the door ".
In the age of the internet of things, ignoring security is tantamount to giving up the right to live!
An uncompromising program code that makes it easy for hackers to succeed.
Mirai virus by scanning the IoT device, try the default universal password to sign in, once the IoT device is successfully included as a " broiler " into the botnet, and then manipulate it to attack other network devices.
The Network Camera, which is controlled by the attack in this attack, DVR, the password in its module is written to the firmware, on the one hand the user is not aware of this password, on the other hand, there is no tool to modify the password of this module, this gives hackers an opportunity. After scanning the vulnerability, the hacker opens the door with a default password, modifies the application's access network address, and then controls its DDoS attack, all of which are " naturally "," Without hindrance ! " The neglect of security makes the application body in the IoT device extremely fragile, and it is easy for the attacker to discover the vulnerability and exploit the vulnerability.
in fact, most mobile applications, applications in the IoT terminal now have no security enhancements to themselves, although the login password is set, but it is easy for the attacker to find a way to get the password or bypass the password. Some anti-compilation down, you can learn the bottom of the application, tampering operation is handy, borrow a network language " simple do not want "!
If you want to learn more about network security, please visit Computer Management software .
Fragile IoT application body makes hackers happy