Please complete the form on this page to get your free copy of A Survey of Published Attacks Against Machine-to-Machine Devices, Services, and Infrastructure. Part 1: Devices
With the rise of M2M come the risks of M2M. In an environment where devices are deployed for years, where device firmware can be difficult to update, and where devices are often unattended and not physically well secured—meaning potential attackers may have complete physical access to your hardware—it can be very challenging to implement low-impact, cost-effective protections.
In this series of white papers we survey recently published attacks against M2M systems. We identify the technical objective of each attack and enumerate the steps the vulnerability researchers took to execute the attacks.
For more information Comtech Telecommunications Cyber Solutions, please see our Cyber Solutions page.