01.07.2021 Views

Cyber Defense eMagazine July 2021 Edition

Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Device onboard occurs when a new device is added to the restricted IoT ecosystem. Eavesdropping may<br />

take place during the onboard step of a new device where the hacker can intercept secret keys that are<br />

used to establish communications within a constrained network.<br />

Final Thoughts<br />

The potential for unpredictable cascading effects of vulnerabilities and poor security in the IoT greatly<br />

affects the overall security of the Internet. Ensuring that these devices are secure is the shared<br />

responsibility of its stakeholders. For example, manufacturers need to address known vulnerabilities in<br />

succeeding products, release patches for existing ones, and report the end of support for older products.<br />

As a general security measure, it’s strongly recommended to protect network access to devices with<br />

appropriate mechanisms, and in some cases, isolate them to make difficult their exploration and doing it<br />

a time-consuming task from the cybercriminals’ point of view.<br />

At last but not least, let’s take IoT security seriously because this field has been used massively by<br />

cybercriminals to compromise organizations and their networks turning this into a big and real threat in<br />

<strong>2021</strong>.<br />

About the Author<br />

Pedro Tavares is a cybersecurity professional and a<br />

founding member of CSIRT.UBI and Editor-in-Chief of<br />

seguranca-informatica.pt.<br />

In recent years he has invested in the field of information<br />

security, exploring and analyzing a wide range of topics,<br />

malware, ethical hacking (OSCP-certified), cybersecurity,<br />

IoT and security in computer networks. He is also a<br />

Freelance Writer.<br />

Segurança Informática blog: www.seguranca-informatica.pt<br />

LinkedIn:<br />

https://www.linkedin.com/in/sirpedrotavares<br />

Twitter:<br />

https://twitter.com/sirpedrotavares<br />

Contact me: ptavares@seguranca-informatica.pt<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2021</strong> <strong>Edition</strong> 88<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!