1. When the IoT device is configured, most of the device users forget or simply are not
interested in changing the login credentials of the device, leaving it as it is.
2. When the IoT device is shipped, the default combination of userid/password becomes
a part of the list for the device’s “known exploits”. The manufacturers of the IoT device
continue working with the same combination of userid/passwords or generate similar
easy combinations, are then included in the list of known attack vectors.
3. It is surprising how many businesses use passwords such as “123456”, “root”, and
“admin” in today’s age as it is extremely easy for cybercriminals ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.