Remove tag social-media
Remove Data Remove Education Remove Encryption Remove Manufacturing
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

The hacker exploited the vulnerability and used these IoT devices to launch a massive attack on social media platforms. Some of the major social media platforms, including Twitter, were down for a couple of hours. As an example, we could use communications between systems that are not properly encrypted.

IoT 133