IoT Hacks: Behind the Scenes
News reports of IoT breaches are now commonplace, with manufacturers often blaming end-user misconfigurations or 'sophisticated attacks'. This implies the victim customers and organizations were simply unlucky, but have you ever wondered exactly how these hacks occurred and what could have been done to prevent them?
Joe Hopper, a professional hacker for the Fracture Labs technology security company, will walk you through:
- How hackers target the victim devices
- How vulnerabilities are discovered
- How the weaknesses are exploited
- What could have been done to prevent the breaches in the first place