O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12–New Surface Threats

Hacking IoT Firmware

Hacking IoT devices is similar to hacking any other IT web site or application. However, there are many more attack surfaces, which we will describe in this next section. The obvious difference is the vast footprint of vulnerable devices – the diversity of things. In addition to this explosion of potential targets have also come increasingly large areas of surface to attack.

Previously security practitioners were reasonably comfortable with the traditional highly fortified bordered network, and then along came IP mobility and BYOD and that turned traditional security blueprints into waste paper. Consequently, more flexible borderless network architectures were required that could accommodate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required