Andy Greenberg and Kim Zetter Security Date of Publication: 12.28.15.
12.28.15
From cars to medical devices to guns, this was the year hackers found and exploited computers in everything.
" “There’s a message here for TrackingPoint and other companies,” Sandvik told WIRED at the time. “When you put technology on items that haven’t had it before, you run into security challenges you haven’t thought about before.” That rule certainly applies to any consumer-focused company thinking of connecting their product to the Internet of Things. But for those whose product can kill—whether a gun, a medical implant, or a car—let’s hope the lesson is taken more seriously in 2016."
Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet. Driven by Internet-wide scanning, Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed.
T. Dillon, A. Talevski, V. Potdar, and E. Chang. Ubiquitous Intelligence and Computing: 6th International Conference, UIC 2009, Brisbane, Australia, (2009)
A. Dridi, S. Sassi, and S. Faiz. 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), page 1421-1428. (October 2017)
S. Lempert, and A. Pflaum. Proceedings of the 6th Conference on Mobile und ubiquitäre Informationssysteme (MMS 2011), volume 185 of LNI, page 53--66. GI, (2011)