Chapter 9–Re-engineering the IoT

It was not long ago that we considered threat surfaces to come through email attachments, drive-past browser attacks, cross application or malware delivered as download links. These were the days when we could think our tablet, smartphone or laptop was safe from attack if we followed basic security best practices. Unfortunately, that has all changed, with the IoT we now have strange new physical devices, such as toys, cars and drones that we need to protect that do not run antivirus software. As a result, we now have attackers using electronic engineering techniques and tools to extract passwords and previously secure authentication details out of chips from a PCB.

In this chapter, we will investigate why this ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.