Abusing the Internet of Things

(Rick Simeone) #1

FIGURE 2-12. Reset button on physical lock


This section provides a good example of issues we need to think through as we increas-
ingly become dependent on mobile apps for ensuring our physical safety. Attacks such as
password guessing and phishing have traditionally been used to compromise our digital


CHAPTER 2: ELECTRONIC LOCK PICKING—ABUSING DOOR LOCKS TO COMPROMISE

(^56) PHYSICAL SECURITY

Free download pdf