Book description
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.
Publisher resources
Table of contents
- Foreword
- Preface
- 1. Lights Out—Hacking Wireless Lightbulbs to Cause Sustained Blackouts
- 2. Electronic Lock Picking—Abusing Door Locks to Compromise Physical Security
- 3. Assaulting the Radio Nurse—Breaching Baby Monitors and One Other Thing
- 4. Blurred Lines—When the Physical Space Meets the Virtual Space
- 5. The Idiot Box—Attacking “Smart” Televisions
- 6. Connected Car Security Analysis—From Gas to Fully Electric
- 7. Secure Prototyping—littleBits and cloudBit
-
8. Securely Enabling Our Future—A Conversation on Upcoming Attack Vectors
- The Thingbots Have Arrived
- The Rise of the Drones
- Cross-Device Attacks
- Hearing Voices
- IoT Cloud Infrastructure Attacks
- Backdoors
- The Lurking Heartbleed
- Diluting the Medical Record
- The Data Tsunami
- Targeting Smart Cities
- Interspace Communication Will Be a Ripe Target
- The Dangers of Superintelligence
- Conclusion
- 9. Two Scenarios—Intentions and Outcomes
- Index
Product information
- Title: Abusing the Internet of Things
- Author(s):
- Release date: August 2015
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491902332
You might also like
book
Programming with 64-Bit ARM Assembly Language: Single Board Computer Development for Raspberry Pi and Mobile Devices
Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including …
book
Cyber Breach Response That Actually Works
You will be breached—the only question is whether you'll be ready A cyber breach could cost …
book
What Are ChatGPT and Its Friends?
ChatGPT is not your run-of-the-mill automated chat server. It's much more. But if you want to …
book
Designing Secure Software
Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant …