IoT Default Passwords: Just Don't Do It

IoT Default Passwords: Just Don't Do ItThe rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.
Earlier this month, an underground forum released the code for the Mirai malware, which lets attackers hijack the thousands (and counting) of Internet of Things devices that are used to carry out distributed denial-of-service attacks.
Panic ensued.
Of course it did. This hack means that everyone can now view the code that allowed someone using the name Anna-senpai to harness 380,000 bots via weak telnet connections. Let's ignore for now that in 2016 there is absolutely no reason to have telnet on any IoT device.
That aside, much of the subsequent hand-wringing over default password damage control missed the one glaring thing that manufacturers, startups, and providers can do to prevent this sort of devastating vulnerability: Don't use default usernames and passwords in the first place.
The most common reasons for using default usernames and passwords boil down into a few key arguments (when you leave out "we've always done it this way," which I won't even dignify with a response because I know if you're reading this, that's not an argument you care about). Keep reading at source site to discover really important information.

lexusAD  tezAD2  

safety verification

Mobileye adopts Synopsys functional safety verification to enable ISO 26262 compliance

Passwords to avoid

Here are the ten most common passwords that will make you easier to hack

Self-driving

@potus says, government must ensure everyone shares in the benefits of this emerging technology.

Javascript power

A history of JavaScript across the stack


Contactos

Teléfonos: +58 212 578 1145
Fax: +58 212 576 3892