What You Need to Know About SHA-3 for Embedded System Security (.PDF Download)
May 20, 2019
On the surface, this sounds ridiculous: A lobby fish tank gets attacked by hackers. Why would anyone want to break into a fish tank (Fig. 1)? But in this case, the aftermath was serious. The fish tank was inside a casino and its temperature and lighting were controlled by an internet-connected system. The break-in provided the hackers with an entryway into the casino’s network—and its sensitive database containing information about high-roller clients.
1. What are the odds that this lobby aquarium could get hacked? It’s fair game if it has an IoT component and is unsecured.
Comments
Comments