IoT hacking
Let's talk about some of the vulnerabilities and some of the hurdles that IoT presents to us.
The first is what I term data value. This involves capturing data as IoT devices communicate with each other and with the cloud behind them or their cloud providers, which increases the risk because it makes IoT more obscure. Time after time, we're starting to see where the IoT environment is allowing attackers to access other devices, as well as networks they may be connected to. So, many companies deploy their IoT environments on their production network, which kind of makes me sad and sick inside.
Another issue is data aggregation. Again, we have a lot of devices here speaking with other resources that may be outside of our control.
There's also something that's referred to as sensor fusion, which is the ability to combine information from two completely disconnected sensing devices to create more complex information or a view of the environment...