Power BI Fundamentals - Create visualizations and dashboards from scratch
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore over 50 real-world IoT vulnerability cases in this 20-minute conference talk that exposes critical security flaws in the Internet of Things ecosystem. Discover systemic issues including vendor-embedded backdoors, predictable credentials, and exploitable configuration consoles through detailed analysis of high-severity vulnerabilities like CVE-2024-48271 (CVSS 9.8) and CVE-2025-1143, which are actively exploited by APT groups and scammers for remote code execution and global device control. Learn how even novice attackers can compromise critical infrastructure including ATMs and water treatment facilities by targeting poorly secured IoT devices. Gain insights into the frustrating realities of vulnerability disclosure processes, including stories of ignored reports, year-long delays, and manufacturer denials despite severe security risks when reporting to CNAs and CERTs. Acquire actionable knowledge about vulnerability discovery techniques, secure development practices, and responsible disclosure processes that will benefit hackers, developers, and manufacturers working to strengthen IoT security across critical infrastructure and consumer devices.
Syllabus
DEF CON 33 - Unveiling IoT Vulns: From Backdoors to Bureaucracy - Kai-Ching Wang, Chiao-Lin Yu
Taught by
DEFCONConference