IoT Default Passwords: Just Don't Do It

IoT Default Passwords: Just Don't Do ItThe rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.
Earlier this month, an underground forum released the code for the Mirai malware, which lets attackers hijack the thousands (and counting) of Internet of Things devices that are used to carry out distributed denial-of-service attacks.
Panic ensued.
Of course it did. This hack means that everyone can now view the code that allowed someone using the name Anna-senpai to harness 380,000 bots via weak telnet connections. Let's ignore for now that in 2016 there is absolutely no reason to have telnet on any IoT device.
That aside, much of the subsequent hand-wringing over default password damage control missed the one glaring thing that manufacturers, startups, and providers can do to prevent this sort of devastating vulnerability: Don't use default usernames and passwords in the first place.
The most common reasons for using default usernames and passwords boil down into a few key arguments (when you leave out "we've always done it this way," which I won't even dignify with a response because I know if you're reading this, that's not an argument you care about). Keep reading at source site to discover really important information.

tezAD2  tezAD2  

Barcode

BlueCart Acquires Sous, Leading Hospitality Tech Innovation

IoT problems

We’re building a world-size robot. How are we going to control it? Recommended by @jcentv

RADIO

Developing a Two-Way Radio on a Single Chip By Peter Brown IEEE

SpaceX

SpaceX is saving a ton of money by re-using Falcon 9 rockets


Contactos

Teléfonos: +58 212 578 1145
Fax: +58 212 576 3892