Poging GOUD - Vrij
Strengthen your network security chain
Voice and Data
|December 2020
A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it
Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.
If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.
For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.
Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.
Dit verhaal komt uit de December 2020-editie van Voice and Data.
Abonneer u op Magzter GOLD voor toegang tot duizenden zorgvuldig samengestelde premiumverhalen en meer dan 9000 tijdschriften en kranten.
Bent u al abonnee? Aanmelden
MEER VERHALEN VAN Voice and Data
Voice and Data
Shaping India's near-future digital playbook
As India enters 2026, these ten technologies will advance network design, strengthen digital infrastructure, and unlock new layers of enterprise value.
11 mins
December 2025
Voice and Data
Securing the nation in an age of silent cyber conflict
India's expanding digital ecosystem now sits at the centre of global cyber conflict, demanding resilience, sovereign control, and Al-driven defence at scale.
4 mins
December 2025
Voice and Data
INDIA'S NEXT NETWORK FRONTIER
Ten deep-tech shifts will redefine how India connects, secures, and scales its digital future in 2026 and beyond—reshaping networks, infrastructure, and innovation.
8 mins
December 2025
Voice and Data
DPDP Act sets new guardrails for India's Al ecosystem
India's data law reshapes the foundations of Al by enforcing trust, clarity, and responsible innovation across every layer of its evolving digital ecosystem.
3 mins
December 2025
Voice and Data
"We are building a Rapido, not a bus, for space"
Immanuel Louis, Co-founder and COO of Astrophel Aerospace, is attempting to rewire how India thinks about satellite launches-from large-ride dependency to faster, indigenous access to orbit. Alongside his co-founder, Louis is building a vertically integrated space-tech startup focused on Made-in-India rocket components, reusable engines, and sub-systems optimised for small and CubeSat missions.
6 mins
December 2025
Voice and Data
Driving speed, stability, and next-gen wireless efficiency
Built on multi-link architecture, expanded spectrum, and higher-order modulation, Wi-Fi 7 lays the foundation for the next phase of immersive and connected living.
4 mins
December 2025
Voice and Data
UNSHACKLING SATCOM: THE POLICY RESET INDIA NEEDS FOR VIKSIT BHARAT
India's connectivity gap demands a regulatory shift that can enable satellite networks to reach regions where terrestrial infrastructure cannot viably operate.
6 mins
December 2025
Voice and Data
Telcos to Techcos: The long climb to a new success story
As operators climb out of the commodity-connectivity trap, they are rebuilding networks, services, and platforms to script a sustainable growth story.
3 mins
December 2025
Voice and Data
When automation turned against the world wide web
A routine Cloudflare update triggered a global outage, exposing the security and stability risks of centralised cloud and why resilience must be re-engineered.
7 mins
December 2025
Voice and Data
6G to need 2-3 GHz more mid-band spectrum by 2040
GSMA forecasts 2-3 GHz more mid-band spectrum needed by 2040 to avoid urban congestion and enable global 6G readiness.
1 min
December 2025
Translate
Change font size
