{"id":591,"date":"2016-01-03T08:00:30","date_gmt":"2016-01-03T07:00:30","guid":{"rendered":"https:\/\/www.boc.de\/watchguard-info-portal\/?p=591"},"modified":"2016-06-16T17:14:10","modified_gmt":"2016-06-16T15:14:10","slug":"watchguard-security-vorhersage-2016-8-breaches-come-to-the-iot-frontier","status":"publish","type":"post","link":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/2016\/01\/watchguard-security-vorhersage-2016-8-breaches-come-to-the-iot-frontier\/","title":{"rendered":"WatchGuard Security Vorhersage 2016 #8 \u2013 Breaches Come to the IoT Frontier"},"content":{"rendered":"<table width=\"100%\">\n<tbody>\n<tr>\n<td><\/td>\n<td>\n<h2><a href=\"http:\/\/watchguardsecuritycenter.com\/2015\/12\/14\/watchguard-security-prediction-8-breaches-come-to-the-iot-frontier\/\"><u>WatchGuard Security Prediction #8 \u2013 Breaches Come to the IoT\u00a0Frontier<\/u><\/a><\/h2>\n<p>by <a href=\"http:\/\/watchguardsecuritycenter.com\/author\/coreynach\/\"><u>Corey Nachreiner<\/u><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>When a hacker hijacks a computer, gaining persistence (or making sure his malicious trojan stays on the computer) is easy. The attacker just has to load malware onto the computer\u2019s hard drive and make sure it runs when the computer reboots. However, hijacking the Internet of Things (IoT) is a different story. Many IoT devices don\u2019t have local storage, and are often small embedded systems with low resources. Gaining persistence on these devices is much more difficult and may actually involve modifying the software these devices use to boot, which we call firmware.<\/p>\n<p><em>Prediction video link: <a href=\"https:\/\/www.youtube.com\/watch?v=iU63Bhmv6LU\"><u>https:\/\/www.youtube.com\/watch?v=iU63Bhmv6LU<\/u><\/a><\/em><\/p>\n<p>Next year, we expect to see more researchers release proof-of-concept attacks that permanently modify and hijack the firmware of IoT devices. It\u2019s not enough to just find a vulnerability in these devices, but you also have to figure out how to inject malicious code that can stick around. We expect to see vendors start to harden the security of\u00a0their IoT devices by implementing secure boot mechanisms that makes it more difficult for attackers to modify firmware.<\/p>\n<p>Visit our\u00a0<a href=\"http:\/\/www.watchguard.com\/2016predictions\"><u>WatchGuard security predictions site<\/u><\/a><\/p>\n<p><strong><em>\u2014\u00a0<\/em><\/strong><a href=\"http:\/\/www.watchguard.com\/corporate-info\/speakers-bureau.asp#coreyn\"><em><u>Corey Nachreiner, CISSP<\/u><\/em><\/a><em>\u00a0(<\/em><a href=\"http:\/\/twitter.com\/SecAdept\"><em><u>@SecAdept<\/u><\/em><\/a><em>)<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WatchGuard Security Prediction #8 \u2013 Breaches Come to the IoT\u00a0Frontier by Corey Nachreiner When a hacker hijacks a computer, gaining persistence (or making sure his malicious trojan stays on the computer) is easy. The attacker just has to load malware onto the computer\u2019s hard drive and make sure it runs when the computer reboots. However, hijacking the Internet of Things (IoT) is a different story. &hellip; <a href=\"https:\/\/wordpress.boc.de\/watchguard-info-portal\/2016\/01\/watchguard-security-vorhersage-2016-8-breaches-come-to-the-iot-frontier\/\" class=\"more-link\">Weiterlesen <span class=\"screen-reader-text\">WatchGuard Security Vorhersage 2016 #8 \u2013 Breaches Come to the IoT Frontier<\/span> <span class=\"meta-nav\">&raquo;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-591","post","type-post","status-publish","format-standard","hentry","category-watchguard-allgemeine-informationen"],"_links":{"self":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/591"}],"collection":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/comments?post=591"}],"version-history":[{"count":1,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/591\/revisions"}],"predecessor-version":[{"id":592,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/591\/revisions\/592"}],"wp:attachment":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/media?parent=591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/categories?post=591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/tags?post=591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}