Remove tag hacker
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

A hacker managed to identify a weak spot in a security camera model. The hacker exploited the vulnerability and used these IoT devices to launch a massive attack on social media platforms. One of the examples relates to the default settings users get when starting to use a new service. Misconfiguration. Vicious insider.

IoT 132