It is well known that connected devices are prime targets for hackers who want to exploit their computing power and large-scale distribution for cybercriminal activities, and in particular DDoS. IoT devices are deployed in the millions, often configured insecurely by default, and typically infrequently maintained. They operate 24/7 and are available at any time, and unlike PCs and servers, they are subjected to few security standards and regulations.
Date : August 17, 2019 at 06:08PM
Tag(s) : #IOT ENG