Denemek ALTIN - Özgür
Strengthen your network security chain
Voice and Data
|December 2020
A poorly-protected WFH device can be the weakest link exposing your organization’s network to cybercriminals. Here are eight simple steps to handle it

Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.
If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.
For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.
Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.
Bu hikaye Voice and Data dergisinin December 2020 baskısından alınmıştır.
Binlerce özenle seçilmiş premium hikayeye ve 9.000'den fazla dergi ve gazeteye erişmek için Magzter GOLD'a abone olun.
Zaten abone misiniz? Oturum aç
Voice and Data'den DAHA FAZLA HİKAYE

Voice and Data
India's silent AI revolution: Infra fuels the new digital core
As India's digital ambition meets reality, enterprises are quietly turning to robust AI infrastructure as the backbone of strategic transformation.
8 mins
August 2025

Voice and Data
NISAR soars: Indo-US ‘golden mesh’ to track Earth’s pulse from orbit
The NASA-ISRO radar satellite will map Earth's dynamic changes with centimetre-level accuracy for climate, agriculture, and disaster resilience.
4 mins
August 2025

Voice and Data
The dark side of AI: ChatGPT's dreaded twin
WormGPT exposes how Al's powerful capabilities are being weaponised, making cybercrime more scalable, persuasive, and dangerously accessible.
4 mins
August 2025

Voice and Data
India’s mobile export rise marks global manufacturing shift
India mobile phone export growth signals a broader transformation, as domestic value chains expand and jobs rise in a maturing manufacturing ecosystem.
2 mins
August 2025

Voice and Data
"The government is backing risk-now industry must lead"
As Secretary of the Department of Science & Technology, Dr Abhay Karandikar is shaping India's innovation agenda at a defining moment.
6 mins
August 2025

Voice and Data
"The future of home Wi-Fi is about smarter, Al-driven networks"
From jitter and latency to interference, spoofed devices, and jamming, WiFi is venturing far beyond its traditional bounds.
4 mins
August 2025

Voice and Data
When machine learns from books: What Indian law must fix
India's first AI copyright case tests how far the law can stretch to keep up with machine learning, global precedents, and the idea of transformative use.
5 mins
August 2025

Voice and Data
Quantum-proofing telecom networks before the storm hits
As quantum threats edge closer, telecom networks must act now to defend sensitive data with hybrid cryptography and quantum-safe strategies.
4 mins
August 2025

Voice and Data
India Q2 tech investment dips; digital infra, communication hold fort
India’s tech sector recorded 60 deals worth USD 460 M in AMJ 2025, marking a steep fall in value, while communication, infra, quantum, and space held firm.
4 mins
August 2025
Voice and Data
Akash Prime hits high-altitude mark with indigenous RF seeker
India successfully tests upgraded Akash Prime system with indigenously developed RF seeker, bolstering high-altitude air defence capabilities.
1 mins
August 2025
Translate
Change font size