New research advances techniques for finding and exploiting known vulnerabilities in IoT devices automatically.
|
Scooped by
Judy Curtis / SIPR
January 23, 2018 9:09 PM
|
Judy Curtis / SIPR's curator insight,
February 14, 2018 5:36 PM
The threat of automated IoT vulnerability finders is a genuine concern. "Absolutely it is coming," says Anders Fogh, a malware analyst for the German security firm GData. "We are waiting for the vendors to realize that security is relevant. They need a dose of bitter medicine." Other researchers are beginning to work on large scale IoT firmware analysis and automatic n-day mining projects as well, acknowledging a future in which attackers can fully exploit IoT vulnerability.
Sign up to comment