To build a safer more connected tomorrow we are going to have to change how we build devices today. This post explores four ways our industry can attack the issue of IoT device security.
For the uninitiated, an attacker over the network or Internet can use a web browser to download the file that stored the dishwasher’s passwords. Tools to then crack the passwords are freely available. Following that, in theory the attacker can then login to the dishwasher and cause it to do their nefariously sudsy bidding.
A thousand candles burned as the mages and engineers toiled away at the demand of the royal court. Day and night through many weeks, the summoned worked to create the minimum viable Great Crystal Wand. Many a merchant and all royalty throughout the land envied the wand. It allowed the Royal Treasury to collect taxes from every payment made at every market in the kingdom, all with but a flick of the Financemancer’s wrist.
This is how a table of folks that have nothing to do with technology built their first threat model over a few hamburgers