Prøve GULL - Gratis
Strengthen your network security chain
Voice and Data
|December 2020
A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it
Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.
If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.
For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.
Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.
Denne historien er fra December 2020-utgaven av Voice and Data.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA Voice and Data
Voice and Data
Reimagining Earth through a living digital twin
A new geospatial alliance led by Aechelon seeks to build a real-time digital twin of Earth, merging satellite, radar, and Al for dynamic intelligence.
3 mins
October 2025
Voice and Data
Telcos find new lifeline in spectrum slicing
As revenues shrink and competition intensifies, spectrum-as-a-service offers telcos a shared model to unlock growth while empowering enterprises.
7 mins
October 2025
Voice and Data
Rethinking enterprise connectivity with managed Wi-Fi
As digital transformation accelerates, managed Wi-Fi is emerging as the backbone of agile, secure, and insight-driven enterprise connectivity in India.
4 mins
October 2025
Voice and Data
Beyond VPN: Building trust into network access
As cyberthreats grow more complex, enterprises are shifting from VPNs to ZTNA to achieve secure, scalable, and context-aware access for remote users.
4 mins
October 2025
Voice and Data
Banking on richer, safer digital conversations
RCS redefines banking communication with verified security, two-way interactivity, and measurable engagement that builds digital trust at lower cost.
3 mins
October 2025
Voice and Data
Powering India's cloud with sustainable data hubs
India's data centre boom is reshaping digital infrastructure, demanding clean energy, local innovation, and policy alignment to sustain its growth.
5 mins
October 2025
Voice and Data
Made in India: Building the backbone of loT hardware
From imported modules to home-grown chips, India's loT hardware story is evolving into one of design control, ecosystem depth, and strategic resilience.
4 mins
October 2025
Voice and Data
Breaking data barriers with light
Li-Fi uses the power of light to deliver ultra-fast, secure, and interference-free connectivity-illuminating a new frontier in digital communication.
7 mins
October 2025
Voice and Data
Cyber defence redefined as firewalls give way to foresight
Data security is evolving from reactive protection to predictive foresight— unifying platforms, intelligence, and AI to make organisations breach-ready.
3 mins
October 2025
Voice and Data
Connecting the currents of digital finance
India's telcos are building the invisible pipes that keep digital payments, inclusion, and innovation flowing across the nation's financial ecosystem.
5 mins
October 2025
Translate
Change font size

