{"id":15056,"date":"2015-04-07T22:13:18","date_gmt":"2015-04-08T03:13:18","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=15056"},"modified":"2015-04-07T22:13:18","modified_gmt":"2015-04-08T03:13:18","slug":"iot-hubs-expose-connected-homes-to-hackers","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=15056","title":{"rendered":"IoT Hubs Expose Connected Homes to Hackers"},"content":{"rendered":"<blockquote><p>Many of the most serious flaws revealed a kind of sloppiness in the design and production of the devices, Brandon Creighton, Veracode\u2019s research architect, told The Security Ledger. For example: both the Ubi and Wink Relay devices left debugging interfaces exposed and unsecured in their shipped product. \u00a0That could provide an avenue for attackers who had access to the same network as the device to steal information or bypass other security controls.<\/p>\n<p>Exposed debugging interfaces are useful during product testing, but have little or no utility to consumers. That suggests that the companies merely forgot to restrict access to them before <a href=\"https:\/\/securityledger.com\/category\/business\/shipping\/\">shipping<\/a>, Creighton said.<\/p><\/blockquote>\n<p>via <a href=\"https:\/\/securityledger.com\/2015\/04\/research-iot-hubs-expose-connected-homes-to-hackers\/\">Research: IoT Hubs Expose Connected Homes to Hackers | The Security Ledger<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of the most serious flaws revealed a kind of sloppiness in the design and production of the devices, Brandon Creighton, Veracode\u2019s research architect, told The Security Ledger. For example: both the Ubi and Wink Relay devices left debugging interfaces &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=15056\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[287],"tags":[176,1308,1261,698],"class_list":["post-15056","post","type-post","status-publish","format-standard","hentry","category-interfaces","tag-embedded-systems","tag-internet-ofthings","tag-open-wifi","tag-security-research"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15056"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15056\/revisions"}],"predecessor-version":[{"id":15057,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15056\/revisions\/15057"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15056"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}