IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them
Security Affairs
OCTOBER 13, 2020
The hacker exploited the vulnerability and used these IoT devices to launch a massive attack on social media platforms. Some of the major social media platforms, including Twitter, were down for a couple of hours. The Flaws in Manufacturing Process. This type of malware attack is called a botnet attack.
Let's personalize your content