Page 1 of 1

By their nature, updating

Posted: Sun Feb 09, 2025 4:12 am
by rakhirhif8963
2017 showed that such gadgets should be in the focus of information security. Thus, last year, experts managed to discover the vulnerability CVE-2017-17215 in Huawei routers, which allowed hackers to turn them into the Satori botnet. Experts classified it as a bot specially designed to work on IoT gadgets. According to a recent study conducted by Osterman Research on behalf of Trustwave, more than half of companies do not have the expertise to detect and fix problems that arise during the operation of IoT gadgets.

“ IoT devices is a complex process, leaving companies vulnerable even after patches are released. To make matters worse, IoT device manufacturers often don’t patch their own firmware at all. Organizations must properly document and test every device connected to the internet or face the prospect of thousands of new attack vectors invented by resourceful cybercriminals,” said Lawrence Munro, vice president of research at Trustwave’s SpiderLabs.

SCADA systems are of particular concern to experts. It lithuania mobile database be noted that in addition to industry and production, they are used to ensure real-time collection, processing, display and archiving of information at nuclear power plants, but, as studies show, SCADA security is far from desirable. According to a study by Trend Micro, on average, it takes at least 150 days to eliminate a vulnerability in SCADA. On the one hand, unlike vendors with well-established update processes like Microsoft and Adobe, SCADA developers need more time to catch “bugs”, but there are many large companies that do not have enough time to release updated firmware, Trend Micro reports.