Page 18 - CDM Exclusive Future of- Cybersecurity Whitepaper with Dr. David G. DeWalt - 2018
P. 18
Pictured above, the plethora of Internet of Things (IoT) devices with more to come
Either way, we have a plethora of Trojan-horses masquerading as innovative and
productivity enhancing devices yet most of them are just waiting to be exploited. I hate
to digress, but I was recently speaking at InfoSec Manchester in the UK and one of the
speakers hacked devices we can’t write about in our magazine and showed how he found
some important individuals using these devices by eavesdropping on wifi
(thinkhttps://www.shodan.io/ for embarrassing IoT devices…need I say more?). These
are the kinds of IoT devices you won’t write home to mom about. He even showed a web
site with a search engine for them. His name is Ken Munro at PenTestPartners
(see:https://www.pentestpartners.com/) but this just confirms Dr. DeWalt’s suspicions
– that your home IoT is a big back door to exploiting you – and if you are a C level
executive at a major corporation, what better way to steal your identity, by riding the
vulnerabilities of your internet of things. Dr. DeWalt also believes we will see major
investments in vulnerability management and intrusion detection and prevention for
IoT. Makes so much sense when you think about it.
SOCIAL & SATELLITE
Billions have shifted from Email to Social Media and Satellites Connect Us Globally
There are nearly four billion people on Social Media networks, daily – that’s nearly half
of all humanity. The issues in this area range from false identities
(see:https://www.cbsnews.com/news/facebook-scams-when-your-friends-are-
actually-hackers/) to the huge regulatory compliance issues impacting Facebook and
Whitepaper Copyright © 2018, Cyber Defense Magazine and Dr. David G. DeWalt. All rights reserved worldwide. 18