Strengthen your network security chain
Voice and Data|December 2020
A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it
PAUL DUCKLIN
Strengthen your network security chain

Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.

If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.

For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.

Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.

Diese Geschichte stammt aus der December 2020-Ausgabe von Voice and Data.

Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.

Diese Geschichte stammt aus der December 2020-Ausgabe von Voice and Data.

Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.

WEITERE ARTIKEL AUS VOICE AND DATAAlle anzeigen
Can US AI copyright law impact Indian policymaking?
Voice and Data

Can US AI copyright law impact Indian policymaking?

The proposed Act suggests compensating original creators for content that is used to train Gen Al. This can be a good middle ground for many in tech to follow

time-read
5 Minuten  |
May 2024
Rise of the connected cars
Voice and Data

Rise of the connected cars

Advanced features like 5G, IoT, and AI are reshaping the automotive industry in India, promising enhanced mobility and safety for drivers

time-read
2 Minuten  |
May 2024
Navigating chaos: Securing trust in digital communication
Voice and Data

Navigating chaos: Securing trust in digital communication

Amid rising fraud risks, CPaaS tools offer a lifeline. SMS, though vulnerable, remains pivotal for real-time alerts in a chaotic digital landscape

time-read
4 Minuten  |
May 2024
The silent communication warhorse
Voice and Data

The silent communication warhorse

While 5G grabs the headlines, 4G LTE quietly fuels global mobile networks, enabling high-speed Internet and IoT growth with wide adoption and growth potential

time-read
3 Minuten  |
May 2024
HPE Launches Wi-Fi 7 APs for enhanced connectivity and security
Voice and Data

HPE Launches Wi-Fi 7 APs for enhanced connectivity and security

Hewlett Packard Enterprise launched Wi-Fi 7 access points (APs), boasting up to 30% more wireless traffic capacity than competitors.

time-read
1 min  |
May 2024
Getting ready for the great Indian switch
Voice and Data

Getting ready for the great Indian switch

India's mobile landscape is undergoing a shift: from feature phones to feature-rich, affordable smartphones, driven by consumers' desire for a better user experience

time-read
3 Minuten  |
May 2024
Net neutrality takes a right turn again
Voice and Data

Net neutrality takes a right turn again

Led by Biden's commitment to protecting the Open Internet, the recent FCC decision has brought the Net Neutrality debate back to the front

time-read
6 Minuten  |
May 2024
It is time to ghost the AI dating bots
Voice and Data

It is time to ghost the AI dating bots

As mobile apps and AI dating bots surge in popularity, addressing pressing concerns about privacy, data manipulation, and transparency is paramount

time-read
3 Minuten  |
May 2024
Will voice interfaces ever take off?
Voice and Data

Will voice interfaces ever take off?

Voice as a primary user interface has shown flickers of promise but has never taken off. Today, with AI at hand, it is still failing to go mainstream

time-read
5 Minuten  |
May 2024
Mega deals paper some cracks for in-turmoil IT firms
Voice and Data

Mega deals paper some cracks for in-turmoil IT firms

Amid the tricky financial year 2023-24, IT firms saw losses in Pack revenue from their telecommunications clients-suggesting that a rejig could be in order

time-read
5 Minuten  |
May 2024