Try GOLD - Free
Ants and Zombies: loT's hidden battles
Voice and Data
|July 2024
The network of loT devices works efficiently within enterprises, but cyberattacks can turn them into zombies, making robust security measures vital
Ants are intelligent. That is why they thrive even in the most inhospitable environments. They have their specific jobs inside a colony. But they also know how to work together. They have two stomachs - one for the food they eat and one to share with other ants. And, of course, they are so tiny. But that is where their strength and network power lie.
That is exactly what comes to one's mind while marvelling at the ease, scale and elegance with which loT devices and lloT sensors have spread all around enterprises. Hard to see from the central tower, these little pixies are busy doing their work on the tiny branches and ant hills across the forest of an enterprise's operations.
They can communicate with others splendidly. They can stomach data for the specific spot's needs but can also help other central processes when needed. Be it a factory, a water utility or a huge farm, these smart machines are silently doing their job of data collection and processing snugly wrapped around those machines, those far-off taps and those sprinklers.
Until they meet zombie fungi.
In other words. Cordyceps. Yes, that very specific and dangerous kind of fungus species known to take over an ant's body and brains living inside them, eating them hollow and then attaching spores inside the ant's bodies so that they travel and spread the infection far and wide.
The world of mycology also sometimes calls them mindcontrol mushrooms. And not the ones you get on the hills with a Brownie.
In a weird twist of fate, the small, smart, and graceful but innocent, unassuming and unprepared ants of the enterprise world have also been infected by the Cordyceps of cyber-attack fungi. If the last few months are given a gander, even if not under a microscope, it is clear how loT devices are turning into weak, vulnerable and easy targets for cyber-attackers.
THE YEAST IS NOW THE BEAST
This story is from the July 2024 edition of Voice and Data.
Subscribe to Magzter GOLD to access thousands of curated premium stories, and 10,000+ magazines and newspapers.
Already a subscriber? Sign In
MORE STORIES FROM Voice and Data
Voice and Data
Reimagining Earth through a living digital twin
A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.
3 mins
October 2025
Voice and Data
Telcos find new lifeline in spectrum slicing
As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.
7 mins
October 2025
Voice and Data
Rethinking enterprise connectivity with managed Wi-Fi
As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.
4 mins
October 2025
Voice and Data
Beyond VPN: Building trust into network access
As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.
4 mins
October 2025
Voice and Data
Banking on richer, safer digital conversations
RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.
3 mins
October 2025
Voice and Data
Powering India's cloud with sustainable data hubs
India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.
5 mins
October 2025
Voice and Data
Made in India: Building the backbone of loT hardware
From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.
4 mins
October 2025
Voice and Data
Breaking data barriers with light
Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.
7 mins
October 2025
Voice and Data
Cyber defence redefined as firewalls give way to foresight
Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.
3 mins
October 2025
Voice and Data
Connecting the currents of digital finance
India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.
5 mins
October 2025
Listen
Translate
Change font size

