Iot trend of the times vrouters or threats

Source: Internet
Author: User

Iot trend of the times vrouters or threats

With The rapid evolution of technology, The Internet of Things (IoT) has once again emerged, and more daily necessities and terminal devices around people have been granted The capability of network connection. Such as automobiles, televisions, refrigerators, and heating systems have become more intelligent and customizable, but security is still lagging behind. Moreover, as a home router of the Internet platform, it is more likely that hackers attack the threat entry of Iot devices.

A vro or a stepping stone to attack Iot Devices

According to previous surveys, more than four terminal devices in 68% of households are connected to Wi-Fi networks, but in terms of router security, its protection performance has been ignored by device manufacturers and the public, leading to frequent hacker attacks.

Currently, domestic wireless routers are available everywhere in the market, which is cheap and prone to vulnerabilities. At the same time, some known household router vulnerabilities have been published for a long time. Therefore, attackers can scan the Internet based on the router ID, quickly identifies vulnerabilities of specific models and targets them.

According to statistics from security agencies, more than half of vrouters currently have weak default security protection, or the passwords used are common and prone to cracking, in the survey, some users use addresses, names, phone numbers, road names, or other words that are easily guessed as passwords.

Insecure routers provide an opportunity for hackers to easily intrude into a large number of home wireless networks. Research shows that if the router is not properly protected, it will become a stepping stone for network attackers to intrude into other connected devices, threatening to connect to IOT devices on it, remote control air conditioners, TVs, refrigerators, monitors, and so on all have the potential to be attacked and manipulated by hackers.

 

Be careful when the router becomes an Iot Device

Threat entry

Therefore, security experts warn vro users who have low security standards or do not change their default passwords when hackers are looking for and searching for controllable Iot devices, may become potential victims.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.