The internet of things (IoT) is a broad term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to send data, receive instructions or both.
There’s an incredibly broad range of things that fall under that category: Internet-connected “smart” versions of traditional appliances like security cameras, refrigerators, light bulbs, Alexa-style digital assistants and many others.
In enterprise settings, IoT can bring the same efficiencies to physical manufacturing and distribution that the internet has long delivered for knowledge work.
Millions of embedded internet-enabled devices worldwide are providing an incredibly rich set of data that companies can use to gather data about their safety of their operations, track assets and reduce manual processes.
Some of the most common IoT devices out there:
Tenda Routers: Tenda is a globally recognized manufacturer of highly popular networking devices for consumers and small-to-medium sized businesses. Tenda focuses on producing easy-to-install and affordable networking solutions.
Samsung DVR: DVRs are a digital storage and retrieval system that opens up all new possibilities in CCTV surveillance operations and management for any business. Samsung have a range of DVR Recorders, used by both individuals and firms.
TVT IP Camera: IP cameras capture images in much the same way as a digital camera, and compress the files to transmit over the network. IP cameras are used with a wired network or wireless and are growing in popularity in private, business and municipal sectors.
Everyone from vendors to enterprise users to consumers is at a potential risk, as new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.
Previously, we had identified various vulnerabilities in IoT devices such as a vRIoT Server Vulnerability or a Xiaomi Air Purifier 2 Firmware Update Process Vulnerability
Think you figured out how to run unauthenticated commands on IoT devices? Found a Samsung vulnerability and don’t know what to do next? Let us be your guides!