Abusing the Internet of Things
Statistics collected from police department reports showed an unusually high number of burglaries in the high-rise condominiums ...
This notice from LifeThings illustrates that the company had no mechanism to modify its server architecture or update the firmwa ...
how a continued lack of due diligence can (and often will) lead to the demise of customer confidence and the provider’s business ...
playing a major role. I sincerely hope that this book has provided you with a solid foundation for understanding the threat land ...
Index. A abuse types (see threat agents) access tokens, 99, 210-213, 233 Accessory Protocol Interface Module (APIM), 166 Advance ...
cloudBit, 190-202 evaluating security risks with, 204-216 access tokens, 210-213 hardware debug interfaces, 213-216 WiFi, 205-21 ...
HBGary Federal, 221 health apps and medical record data, 241 Heartbleed, 240-240, 248 hijacking credentials, 95-100 (see also pa ...
NSA (National Security Agency), 217 O Onity HT door lock, 38-38, 41-43, 57 OnStar system (see telematics vulnerabilities) Open V ...
speech-recognition technologies, 234-238 spoofing alerts, 162-163 SQL injection vulnerability, 221 sslstrip tool, 150-152 static ...
X X11 WindowSystem, 139 XOR encryption, 129-136 XSS (Cross Site Scripting) attack vector, 144 Y Yavor, Josh, 142 Z Z-Wave protoc ...
Colophon The cover fonts are URW Typewriter and Guardian Sans. The text font is Scala Pro; the head- ing font is URW Typewriter; ...
«
6
7
8
9
10
11
12
13
14
15
»
Free download pdf