<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>IoT SECURITY(HACKING IoT)</title><link>https://community.element14.com/technologies/internet-of-things/w/documents/1294/iot-security-hacking-iot</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>IoT SECURITY(HACKING IoT)</title><link>https://community.element14.com/technologies/internet-of-things/w/documents/1294/iot-security-hacking-iot</link><pubDate>Wed, 06 Oct 2021 20:46:40 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:8c750429-8f84-4114-a958-ff5aa77cdab6</guid><dc:creator>mr.osint</dc:creator><comments>https://community.element14.com/technologies/internet-of-things/w/documents/1294/iot-security-hacking-iot#comments</comments><description>Current Revision posted to Documents by mr.osint on 10/6/2021 8:46:40 PM&lt;br /&gt;
&lt;p style="margin:0;"&gt;The results of this research are particularly relevant in light of the growing risk that businesses face as employees accumulate more interconnected devices on their home networks. If key personnel are operating IoT devices on networks that are routinely exposed to business assets, a compromise on an otherwise relatively low-value target – like the video baby monitors covered in this research – can quickly provide a path to compromise of the larger, nominally external, organizational network.&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;a class="jive-link-external-small" href="https://www.rapid7.com/resources/iot/" rel="nofollow ugc noopener" target="_blank"&gt;https://www.rapid7.com/resources/iot/&lt;/a&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;a class="jive-link-external-small" href="https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf" rel="nofollow ugc noopener" target="_blank"&gt;https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: metasploit, hack, internet_of_things, rapid7&lt;/div&gt;
</description></item></channel></rss>