Internet of Things Devices as a DDoS Vector
As adoption of Internet of Things devices increases, so does the number of insecure IoT devices on the network. These devices represent an ever-increasing pool of computing and communications capacity open to misuse. They can be hijacked to spread malware, recruited to form botnets to attack other Internet users, and even used to attack critical national infrastructure, or the structural functions of the Internet itself (we give several examples from recent headlines in the Reference Section, below).
The problem this poses is what to do about IoT as a source of risk. This blog post includes reflections on events that came to light in recent weeks, sets out some thoughts about technical mitigations, and sketches out the boundaries of what we think can be done technically. Beyond those boundaries lie the realms of policy measures, which – while relevant to the big picture – are not the topic of this post.
Why are we exploring this issue now? Partly because of our current campaign to improve trust in consumer IoT devices.
And partly, also, because of recent reports that, as a step towards mitigating this risk, connected devices will be subjected to active probing, to detect whether or not they Continue reading
The SD-WAN market is so hot right now that vendors, especially security companies, can’t help but...
Google teamed up with seven open source software vendors including MongoDB, Elastic, and Redis...
The OpenStack community is "focused on the needs of users," thus it "naturally includes many...
The storage caching appliance combines hardware from Dell EMC and Microsoft software in a pizza box...
In a busy market, the chipmaker seeks to compete with the likes of Nvidia and Intel by developing a...
The Swiss carrier plans to be first in Europe to offer 5G smartphones and networks simultaneously.
The cloud-based SD-WAN provider is expanding its network and service into London, Frankfurt, and...