![]() ![]() Someone hacks your device and use it for different things like mail bot or DOS (Denial of Service) device or WLAN jammer (why is this a problem? Scanario 5).Someone hacks your network and can interact with your devices (why is this a problem? Scanario 4).Someone hacks your device and is able to read and change any value on your MQTT server (why is this a problem? Scanario 3).Someone hacks your device and is able to log in into your WLAN.Someone is able to communicate with your device ( Scenario 1).There are following potential risks you have to mitigate: This is not only valid for your mobile phones and computers, but also for you Smart TV, you Alexa, or all of your SONOFF devices (ESP8266). Whenever you add devices to your network you generate additional points of potential intrusion. Securing your IoT from hacking General Weaknesses ~ ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |