Some machine-to-machine (M2M) protocols can be abused by malicious actors in attacks aimed at Internet of Things (IoT) and industrial Internet of Things (IIoT) systems, according to research conducted by Trend Micro and the Polytechnic University of Milan.
from SecurityWeek RSS Feed https://ift.tt/2APU1WR
via https://ifttt.com/ IFTTT
No comments:
Post a Comment