{"id":11751,"date":"2016-10-22T18:42:59","date_gmt":"2016-10-22T22:42:59","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=11751"},"modified":"2016-10-22T18:47:12","modified_gmt":"2016-10-22T22:47:12","slug":"the-future-of-the-iot","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/the-future-of-the-iot\/","title":{"rendered":"The Future of the IoT"},"content":{"rendered":"<h1>The Future of the IoT<\/h1>\n<p>A few days ago <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/ransomware-on-the-iot\/\" target=\"_blank\">we wrote about the lack of security on the IoT<\/a>\u00a0<\/span>(The Internet of Things), and on Friday, the USA got a quick lesson in just how vulnerable the IoT is. We also learned how the IoT&#8217;s generally lax secuity, can affect the Internet&#8217;s biggest, most successful Web sites, a well as Internet communications and Internet commerce.<\/p>\n<p>This is from today&#8217;s (October 22, 2016) &#8220;USA Today&#8221;. We thought you&#8217;d find it interesting&#8230;<\/p>\n<blockquote><p>SAN FRANCISCO \u2014 Technology experts warned for years that the millions of Internet-connected &#8220;smart&#8221; devices we use every day are weak, easily hijacked and could be turned against us.<\/p>\n<p>The massive siege on Dyn, a New Hampshire-based company that monitors and routes Internet traffic, shows those ominous predictions are now a reality.<\/p>\n<p>An unknown attacker intermittently knocked many popular websites offline for hours Friday, from Amazon to Twitter and Netflix to Etsy. How the breach occurred is a cautionary tale of the how the rush to make humdrum devices \u201csmart\u201d while sometimes leaving out crucial security can have major consequences.<\/p>\n<p>Dyn, a provider of Internet management for multiple companies, was hit with a large-scale distributed denial of service attack (DDoS), in which its servers were flooded with millions of fake requests for information, so many that they could no longer respond to real ones and crashed under the weight.<\/p><\/blockquote>\n<blockquote><p>Who orchestrated the attack is still unknown. But how they did it \u2014 by enslaving ordinary household electronic devices such as DVRs, routers and digital closed-circuit cameras \u2014is established.<\/p>\n<p>The attackers created a digital army of co-opted robot networks, a &#8220;botnet,&#8221; that spewed millions of nonsense messages at Dyn&#8217;s servers. Like a firehose, they could direct it at will, knocking out the servers, turning down the flow and then hitting it full blast once again.<\/p>\n<p>The specific weapon? An easy-to-use botnet-creating software called Mirai that requires little technical expertise. An unknown person released it to the hacker underground earlier this month, and security experts immediately warned it might come into more general use.<\/p><\/blockquote>\n<p><a href=\"https:\/\/goo.gl\/M8ogmV\" target=\"_blank\"><span style=\"text-decoration: underline;\">Source &#8220;USA Today&#8221;\u00a0<\/span><\/a><\/p>\n<p>Do you think this is just a test and that worse things are coming? Or do you think this was just one-time attack and it&#8217;s not going any further than it did on Friday?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Future of the IoT A few days ago we wrote about the lack of security on the IoT\u00a0(The Internet of Things), and on Friday, the USA got a quick lesson in just how vulnerable the IoT is. We also learned how the IoT&#8217;s generally lax secuity, can affect the Internet&#8217;s biggest, most successful Web sites, a well\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/the-future-of-the-iot\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1433,1678,1426,1656,1674],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/11751"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=11751"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/11751\/revisions"}],"predecessor-version":[{"id":11754,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/11751\/revisions\/11754"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=11751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=11751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=11751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}