It’s been a decade since we’ve accepted the idea that the perimeter strategy to security is ineffective: The endpoints must strive to protect their own stack rather than rely on their network segment being completely trust worthy.However, this notion has mostly permeated the corporate space as an emergency.This enables local malware or any server in the path via the ISP to capture the credentials and spy on the camera owners.
All of these consequences have been unexpected and we are looking into what we can do to prevent them from happening again.
The issue was that a software update to Telstra's own internal DNS server brought it down unexpectedly, which effectively killed off the telco's fixed broadband network.
That cascade then brought to light a bug with certain firmwares on certain customer modems, i Tnews reports, kicking them offline and causing them to reset.
As seen by the detailed illustrations in the above examples, we cannot secure our future by asserting that Io T devices and supporting applications have no responsibility to protecting the user’s privacy and security beyond requiring the user setup a strong Wi Fi password.
Io T device manufacturers should lay the foundation for a strong security architecture that is usable as well as not easily susceptible to other devices on the network.
The We Mo allows any i OS device on your network to connect to it and listen in without a password.