For a youngster, the Mirai botnet has gotten more than its share of attention in its short life. The botnet first came to prominence when researchers discovered it was used in an attack on Brian Krebs’s site several weeks ago, and later on a hosting provider. It gained more fame because it’s made up of compromised CCTV cameras, surveillance cameras, DVRs, and other non-computers. And then when someone used Mirai to attack DNS provider Dyn last week, the Internet lost its collective mind. To figure out what it all means and whether this is the future we have in store, Dennis Fisher talked with Ronnie Tokazowski of Flashpoint about the effects of the attacks and how to fix IoT security.
Music by Chris Gonsalves and Ken Montigny.
Photo: TVZ Design. CC By 2.0 license.
Written by: Mike Yang
Recent Posts
- 7 Call Center Trends We Expect to See Throughout 2024
- 5 Tips for Improving Contact Center Productivity
- Pindrop’s ICASSP 2024 paper shows how room acoustics can enhance liveness detection
- Pindrop® Pulse, First to Accurately Detect Deepfakes from OpenAI’s Voice Engine
- 4 Top Cybersecurity Trends Discovered From Our Recent CFX Event