Data Digest: Cyberattacks from IoT, IoT Malware Released, IoT Insight Strategies
Learn how IoT devices were used in DDoS attacks, when such malware works, and how to gain more insights from IoT data.
- By Quint Turner
- October 10, 2016
This article discusses an alarming trend: large-scale DDoS attacks carried out by compromised IoT devices.
Read more at MIT Technology Review
The source code for a Trojan program that caused IoT devices to launch distributed denial-of-service attacks has been published online.
Read more at Computer World
Early IoT adopters have reported difficulty gaining useful insight from the new technology. This article offers strategies for generating meaning from IoT data.
Read more at Computer World
About the Author
Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.