{"id":3629,"date":"2015-11-05T09:50:24","date_gmt":"2015-11-05T09:50:24","guid":{"rendered":"http:\/\/www.kaspersky.com.cn\/blog\/?p=3629"},"modified":"2020-02-27T00:17:48","modified_gmt":"2020-02-26T16:17:48","slug":"more-connected-less-secure-how-we-probed-iot-for-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/more-connected-less-secure-how-we-probed-iot-for-vulnerabilities\/3629\/","title":{"rendered":"&#8220;\u591a\u5219\u751f\u5371&#8221;\uff1a\u6211\u4eec\u662f\u5982\u4f55\u4ece\u7269\u8054\u7f51\u4e2d\u627e\u51fa\u6f0f\u6d1e\u7684"},"content":{"rendered":"<p>\u4e00\u5e74\u524d\uff0c\u6211\u4eec\u7684\u540c\u4e8bDavid Jacoby\uff08GReAT\u56e2\u961f\u7684\u5b89\u5168\u7814\u7a76\u4e13\u5bb6\uff09\u6210\u529f\u9ed1\u5ba2\u5165\u4fb5\u4e86\u81ea\u5df1\u5bb6\u4e2d\u7684\u5404\u79cd\u8bbe\u5907\uff0c\u540c\u65f6\u8fd8\u6709\u5f88\u591a\u6709\u8da3\u7684\u53d1\u73b0\u3002\u8bb8\u591a\u5361\u5df4\u65af\u57fa\u5b9e\u9a8c\u5ba4\u5458\u5de5\u6df1\u53d7David\u8bd5\u9a8c\u7684\u9f13\u821e\uff0c\u7eb7\u7eb7\u8dc3\u8dc3\u6b32\u8bd5\uff0c\u5728\u81ea\u5df1\u5bb6\u4e2d\u5c55\u5f00\u76f8\u540c\u7684\u8bd5\u9a8c\u3002<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/11\/06153454\/internet-of-things-s10-290307.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3631\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/11\/06153454\/internet-of-things-s10-290307.jpg\" alt=\"internet-of-things-s10-290307\" width=\"700\" height=\"848\"><\/a><br>\n\u4e3a\u4e86\u4ece\u667a\u80fd\u8bbe\u5907\u4e2d\u627e\u51fabug\uff0c\u6211\u4eec\u9009\u62e9\u4e86\u51e0\u6b3e\u6d41\u884c\u7684\u7269\u8054\u7f51\u8bbe\u5907\uff08IoT\uff09\u4f5c\u4e3a\u8bd5\u9a8c\u5bf9\u8c61\uff0c\u5305\u62ec\u4e86Google Chromecast\uff08\u63a5\u6536\u89c6\u9891\u6d41\u7684\u7535\u89c6\u68d2\uff09\u3001\u7f51\u7edc\u6444\u50cf\u5934\u3001\u667a\u80fd\u5496\u5561\u673a\u4ee5\u53ca\u4e00\u5957\u5bb6\u5ead\u5b89\u5168\u7cfb\u7edf\u2013\u5176\u5171\u540c\u4e4b\u5904\u5728\u4e8e\u53ea\u9700\u4e00\u90e8\u667a\u80fd\u624b\u673a\u6216\u4e00\u6b3e\u624b\u673a\u5e94\u7528\u7a0b\u5e8f\u5c31\u80fd\u5b8c\u5168\u8fdb\u884c\u64cd\u63a7\u3002\u6240\u6709\u8bd5\u9a8c\u5bf9\u8c61\u7684\u578b\u53f7\u548c\u54c1\u724c\u5747\u4e3a\u968f\u673a\u9009\u62e9\uff0c\u4e0e\u5177\u4f53\u54ea\u5bb6\u751f\u4ea7\u5546\u5e76\u65e0\u5173\u7cfb\u3002<\/p>\n<p>\u6211\u4eec\u7684\u8bd5\u9a8c\u8bc1\u660e\u4e86\u6240\u6709\u7269\u8054\u7f51\u8bbe\u5907\u5747\u53ef\u80fd\u4f1a\u906d\u5230\u9ed1\u5ba2\u5165\u4fb5\uff0c\u6216\u8f7b\u6613\u611f\u67d3\u75c5\u6bd2\u5e76\u6210\u4e3a\u7f51\u7edc\u9ed1\u5ba2\u7684\u201d\u730e\u7269\u201d\u3002\u4e3a\u6b64\uff0c\u6211\u4eec\u7279\u610f\u5411\u5404\u6709\u5173\u751f\u4ea7\u5546\u62a5\u544a\u4e86\u8fd9\u4e9b\u6f0f\u6d1e\u3002\u8fc4\u4eca\u4e3a\u6b62\uff0c\u5176\u4e2d\u4e00\u4e9b\u4ea7\u54c1\u7684\u6f0f\u6d1e\u5f97\u4ee5\u4fee\u590d\uff0c\u53e6\u4e00\u4e9b\u5219\u4ecd\u7136\u5b58\u5728\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">IoT: How I hacked my home <a href=\"http:\/\/t.co\/CCx9eQEbL2\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/CCx9eQEbL2<\/a> via <a href=\"https:\/\/twitter.com\/Securelist?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Securelist<\/a> by researcher <a href=\"https:\/\/twitter.com\/JacobyDavid?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@JacobyDavid<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/InternetofThings?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#InternetofThings<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/502462821574393857?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 21, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>Chromecast\u7535\u89c6\u68d2<\/strong><\/p>\n<p>Google Chromecast\u7684\u53d1\u660e\u8005\u663e\u7136\u9057\u6f0f\u4e86\u4e00\u4e2abug\uff0c\u8be5bug\u80fd\u8ba9\u9ed1\u5ba2\u53d8\u8eab\u4e3a\u201d\u7535\u89c6\u53f0\u7f16\u5bfc\u201d\uff0c\u5728\u53d7\u5bb3\u4eba\u667a\u80fd\u7535\u89c6\u673a\u4e0a\u968f\u610f\u64ad\u653e\u5404\u79cd\u8282\u76ee\u2013\u6bd4\u5982\u5e7f\u544a\u3001\u6050\u6016\u7535\u5f71\u6216\u662f\u4e9b\u5947\u602a\u7684\u56fe\u7247\u3002\u4e00\u65e6\u7f51\u7edc\u653b\u51fb\u8005\u6210\u529f\u6f5c\u5165\u4f60\u7684\u8bbe\u5907\uff0c\u9664\u975e\u7528\u6237\u8d2d\u4e70\u65b0\u7684\u7535\u89c6\u68d2\u6216\u91cd\u65b0\u4f7f\u7528\u7535\u89c6\u7ebf\uff0c\u5426\u5219\u4ed6\u4eec\u5c31\u80fd\u4e00\u76f4\u4e3a\u6240\u6b32\u4e3a\u4e0b\u53bb\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/11\/06151219\/surviving-iot-chromecast.jpg\" alt=\"\" width=\"800\" height=\"800\"><\/p>\n<p>\u9ed1\u5ba2\u5982\u88c5\u5907\u6709\u5b9a\u5411\u5929\u7ebf\u7684\u8bdd\uff0c\u5219\u5373\u4fbf\u5728\u79bb\u53d7\u5bb3\u4eba\u5bb6\u5f88\u8fdc\u7684\u5730\u65b9\uff0c\u4e5f\u80fd\u5728\u53d7\u5bb3\u4eba\u89c2\u770b\u81ea\u5df1\u6700\u559c\u7231\u7684\u8282\u76ee\u65f6\u8fdb\u884c\u5404\u79cd\u5e72\u6270\u2013\u4e14\u51e0\u4e4e\u4e0d\u5b58\u5728\u88ab\u6293\u7684\u98ce\u9669\u3002Chromecast\u7684\u8fd9\u4e00\u6f0f\u6d1e\u957f\u4e45\u4ee5\u6765\u4e00\u76f4\u5b58\u5728\uff0c\u4e14\u81f3\u4eca\u672a\u80fd\u4fee\u590d\u3002<\/p>\n<p><strong>\u7f51\u7edc\u6444\u50cf\u5934<\/strong><\/p>\n<p>\u8bd5\u9a8c\u4e2d\u6211\u4eec\u6240\u6d4b\u8bd5\u7684\u7f51\u7edc\u6444\u50cf\u5934\u5b9e\u9645\u4e0a\u662f\u901a\u8fc7\u667a\u80fd\u624b\u673a\u8fdb\u884c\u7ba1\u7406\u7684\u5a74\u513f\u76d1\u89c6\u5668\u3002\u987a\u4fbf\u63d0\u4e00\u4e0b\uff0c\u6b64\u7c7b\u8bbe\u5907\u65e9\u57282013\u5e74\u5c31\u906d\u9ed1\u5ba2\u5165\u4fb5\uff0c\u5e76\u5728\u6b64\u540e\u4e0d\u65ad\u906d\u5230\u6f0f\u6d1e\u5229\u7528\u3002\u6211\u4eec\u6240\u9009\u7684\u578b\u53f7\u5c3d\u7ba1\u662f2015\u5e74\u6700\u65b0\u751f\u4ea7\u7684\uff0c\u4f46\u4f9d\u7136\u4ece\u4e2d\u627e\u51fa\u4e86\u51e0\u4e2abug\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/11\/06151219\/surviving-iot-ipcam.jpg\" alt=\"\" width=\"800\" height=\"800\"><\/p>\n<p>\u4f7f\u7528\u9ed8\u8ba4\u5a74\u513f\u76d1\u89c6\u5668\u5e94\u7528\u8fdb\u884c\u7be1\u6539\uff0c\u7f51\u7edc\u9ed1\u5ba2\u80fd\u591f\u83b7\u53d6\u516c\u53f8\u6240\u6709\u5ba2\u6237\u7684\u7535\u90ae\u5730\u5740\u3002\u7531\u4e8e\u5927\u591a\u6570\u8d2d\u4e70\u6b64\u7c7b\u4ea7\u54c1\u7684\u90fd\u662f\u4e3a\u4eba\u7236\u6bcd\uff0c\u56e0\u6b64\u8fd9\u6837\u4e00\u4e2a\u7efc\u5408\u5ba2\u6237\u6570\u636e\u5e93\u5c06\u6210\u4e3a\u7f51\u7edc\u9493\u9c7c\u8005\u53d1\u52a8\u6709\u9488\u5bf9\u6027\u653b\u51fb\u7684\u7406\u60f3\u76ee\u6807\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Who is to blame for \u201chacked\u201d private cameras? <a href=\"https:\/\/t.co\/WItQAZKAbU\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/WItQAZKAbU<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/webcams?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#webcams<\/a> <a href=\"http:\/\/t.co\/k7LcRXH6vX\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/k7LcRXH6vX<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/535838818780594177?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 21, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u6211\u4eec\u7684\u7814\u7a76\u4e13\u5bb6\u4eec\u8fd8\u5728\u5176\u4e2d\u53d1\u73b0\u4e86\u5176\u5b83\u51e0\u4e2a\u8db3\u4ee5\u5b8c\u5168\u638c\u63a7\u6444\u50cf\u5934\u7684\u6f0f\u6d1e \uff1a\u4e0d\u4ec5\u80fd\u770b\u5230\u548c\u542c\u5230\u623f\u5185\u53d1\u751f\u7684\u4e00\u5207\uff0c\u8fd8\u80fd\u4efb\u610f\u64ad\u653e\u8bbe\u5907\u5185\u7684\u97f3\u9891\u6587\u4ef6\uff1b\u6216\u8005\u83b7\u53d6\u6839\u8bbf\u95ee\u6743\u9650\u5e76\u4fee\u6539\u6444\u50cf\u5934\u5185\u8f6f\u4ef6\uff0c\u8fd9\u610f\u5473\u7740\u60a8\u5c06\u6210\u4e3a\u8fd9\u4e00\u5c0f\u578b\u2019\u667a\u80fd\u2019\u8bbe\u5907\u7684\u771f\u6b63\u4e3b\u4eba\u3002\u6211\u4eec\u4e0d\u4ec5\u5411\u76f8\u5173\u751f\u4ea7\u5546\u62a5\u544a\u4e86\u6f0f\u6d1e\u60c5\u51b5\uff0c\u540c\u65f6\u8fd8\u5e2e\u52a9\u4ed6\u4eec\u4fee\u590d\u8fd9\u4e9b\u6f0f\u6d1e\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hacked Baby Monitor: Security Experts Warn 'Change Your Password' After Cameras Compromised <a href=\"http:\/\/t.co\/MPHZd2Y5Bc\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/MPHZd2Y5Bc<\/a> via @HuffPostUKTech<\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/460811096719638528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 28, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>\u6765\u676f\u70ed\u5496\u5561<\/strong><\/p>\n<p>\u5bf9\u4e8e\u9ed1\u5ba2\u5165\u4fb5Chromecast dongle\uff08\u52a0\u5bc6\u7535\u89c6\u68d2\uff09\u548c\u5a74\u513f\u76d1\u89c6\u5668\u5bf9\u6211\u4eec\u751f\u6d3b\u9020\u6210\u7684\u5404\u79cd\u4e0d\u4fbf\uff0c\u6211\u4eec\u5e94\u8be5\u90fd\u80fd\u5f88\u5bb9\u6613\u7406\u89e3\u3002\u4f46\u5496\u5561\u673a\u906d\u9ed1\u5ba2\u5165\u4fb5\u4f1a\u4ea7\u751f\u4ec0\u4e48\u95ee\u9898\u5462\uff1f\u78b0\u5de7\u7684\u662f\uff0c\u9ed1\u5ba2\u4e00\u65e6\u6210\u529f\u5165\u4fb5\u5496\u5561\u673a\u5c31\u80fd\u8f7b\u6613\u5bf9\u53d7\u5bb3\u4eba\u8fdb\u884c\u76d1\u89c6\uff0c\u540c\u65f6\u8fd8\u4f1a\u5bfc\u81f4\u5bb6\u91ccWi-Fi\u5bc6\u7801\u6cc4\u6f0f\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/11\/06151218\/surviving-iot-wifi-coffee.jpg\" alt=\"\" width=\"800\" height=\"800\"><\/p>\n<p>\u51fa\u4eba\u610f\u6599\u7684\u662f\uff0c\u8fd9\u4e00\u95ee\u9898\u7adf\u7136\u76f8\u5f53\u68d8\u624b\uff0c\u4ee5\u81f3\u4e8e\u751f\u4ea7\u5546\u5230\u76ee\u524d\u4e3a\u6b62\u4f9d\u7136\u672a\u80fd\u4fee\u590d\u8fd9\u4e00bug\u3002\u4f46\u60c5\u51b5\u5e76\u4e0d\u7b97\u592a\u4e25\u91cd\uff1a\u6bcf\u6b21\u7559\u7ed9\u9ed1\u5ba2\u201d\u4f5c\u6848\u201d\u7684\u65f6\u95f4\u53ea\u6709\u77ed\u77ed\u7684\u51e0\u5206\u949f\u800c\u5df2\u3002\u4f46\u5c31\u7b97\u4f60\u66f4\u6539\u4e86Wi-Fi\u5bc6\u7801\uff0c\u95ee\u9898\u4f9d\u7136\u5b58\u5728\u2013\u5496\u5561\u673a\u4f1a\u201d\u4e49\u65e0\u53cd\u987e\u201d\u5730\u4e00\u6b21\u53c8\u4e00\u6b21\u5c06\u5bc6\u7801\u5916\u6cc4\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">ICYMI: Kaspersky Lab CEO: The Internet of Things means 'Internet of Threats' <a href=\"http:\/\/t.co\/iGeU9N8iqw\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/iGeU9N8iqw<\/a> via <a href=\"https:\/\/twitter.com\/BostonBizNews?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@BostonBizNews<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/576051398049210368?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 12, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>\u5c45\u5bb6\u5b89\u5168<\/strong><\/p>\n<p>\u667a\u80fd\u5bb6\u5ead\u5b89\u5168\u7cfb\u7edf\u6700\u7ec8\u8fd8\u662f\u5728\u8fd9\u573a\u201d\u5b89\u5168\u6218\u4e89\u201d\u4e2d\u5931\u8d25\u4e86\u3002\u4ee4\u4eba\u611f\u5174\u8da3\u7684\u662f\uff0c\u8fd9\u91cc\u4e0e\u6211\u4eec\u7684\u4e13\u77e5\u65e0\u5173\u2013\u4e8b\u5b9e\u4e0a\uff0c\u5176\u4e2d\u53ea\u6d89\u53ca\u57fa\u7840\u7684\u7269\u7406\u77e5\u8bc6\u3002\u8be5\u7cfb\u7edf\u91c7\u7528\u4e86\u7279\u6b8a\u4f20\u611f\u5668\u5bf9\u78c1\u573a\u8fdb\u884c\u76d1\u63a7\uff0c\u800c\u78c1\u573a\u5219\u662f\u7531\u9501\u5185\u7684\u78c1\u94c1\u53d1\u51fa\u3002\u4e00\u65e6\u6709\u7a83\u8d3c\u8bd5\u56fe\u6253\u5f00\u7a97\u6216\u7834\u95e8\u800c\u5165\uff0c\u78c1\u573a\u5c31\u4f1a\u53d7\u5230\u5e72\u6270\u540c\u65f6\u4f20\u611f\u5668\u4f1a\u53d1\u51fa\u8b66\u62a5\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2015\/11\/06151218\/surviving-iot-cloud-alarm.jpg\" alt=\"\" width=\"800\" height=\"800\"><\/p>\n<p>\u4f46\u4e0d\u6cd5\u5206\u5b50\u5b8c\u5168\u53ef\u4ee5\u4f7f\u7528\u4e00\u5757\u7b80\u5355\u7684\u78c1\u94c1\u8ba9\u78c1\u573a\u7ef4\u6301\u4e0d\u53d8\uff0c\u5373\u4f7f\u7834\u95e8\u95ef\u5165\u4e5f\u4e0d\u4f1a\u8ba9\u78c1\u573a\u4ea7\u751f\u53d8\u5316\u3002\u8fd9\u4e00\u95ee\u9898\u65e9\u5df2\u4f17\u6240\u5468\u77e5\uff0c\u539f\u56e0\u5728\u4e8e\u8bb8\u591a\u6d41\u884c\u7684\u5b89\u4fdd\u7cfb\u7edf\u5747\u91c7\u7528\u4e86\u7c7b\u4f3c\u7684\u4f20\u611f\u5668\u3002\u6b64\u5916\uff0c\u5373\u4fbf\u6253\u4e0a\u5b89\u5168\u8865\u4e01\u4e5f\u65e0\u52a9\u4e8e\u95ee\u9898\u7684\u89e3\u51b3\u2013\u6700\u597d\u7684\u65b9\u6cd5\u5c31\u662f\u4ece\u6839\u672c\u4e0a\u6539\u53d8\u7cfb\u7edf\u7ed3\u6784\u3002<\/p>\n<p>\u81f3\u4e8e\u8f6f\u4ef6\u65b9\u9762\uff0c\u8be5\u7cfb\u7edf\u53ef\u4ee5\u8bf4\u662f\u505a\u7684\u76f8\u5f53\u51fa\u8272\uff0c\u5bf9\u4e8e\u90a3\u4e9b\u5b66\u6821\u91cc\u6ca1\u5b66\u597d\u7269\u7406\u7684\u7f51\u7edc\u653b\u51fb\u8005\u6216\u7a83\u8d3c\u800c\u8a00\uff0c\u8fd9\u4e00\u7cfb\u7edf\u5b8c\u5168\u5c31\u662f\u4e00\u5ea7\u2019\u575a\u4e0d\u53ef\u6467\u2019\u7684\u5821\u5792\u3002<\/p>\n<p>\u6709\u5173\u6211\u4eec\u5bfb\u627e\u6f0f\u6d1e\u4ee5\u53ca\u4e0e\u5404\u76f8\u5173\u751f\u4ea7\u5546\u4e4b\u95f4\u6c9f\u901a\u7684\u8be6\u7ec6\u8bb0\u5f55\u5df2\u53d1\u5e03\u5728\u4e86Securelist\u7f51\u7ad9\u4e0a\uff0c\u76f8\u5173\u5185\u5bb9\u53ef\u4ee5\u4ece\u8fd9\u91cc\u627e\u5230\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How will the Internet of Things affect cybersecurity? \u2013 <a href=\"http:\/\/t.co\/fWScmf4QfQ\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/fWScmf4QfQ<\/a> <a href=\"http:\/\/t.co\/sAk1mcZPg5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sAk1mcZPg5<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/586174972156108800?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 9, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u8981\u60f3\u5c06\u5371\u9669\u964d\u81f3\u6700\u4f4e\u5e76\u8ba9\u81ea\u5df1\u7684\u5bb6\u53d8\u5f97\u66f4\u52a0\u5b89\u5168\uff0c\u8bf7\u52a1\u5fc5\u9075\u7167\u6211\u4eec\u7684\u5efa\u8bae\uff1a<\/p>\n<p>\u2014\u5728\u9009\u62e9\u5b89\u88c5\u667a\u80fd\u5bb6\u5ead\u5b89\u4fdd\u7cfb\u7edf\u6216\u667a\u80fd\u8bbe\u5907\u65f6\uff0c\u9996\u5148\u8003\u8651\u7684\u5e94\u8be5\u662f\u5b89\u5168\u56e0\u7d20\u3002\u4f60\u5bb6\u4e2d\u662f\u5426\u5b58\u653e\u4e86\u8bb8\u591a\u8d35\u91cd\u7269\u54c1\uff1f\u7406\u5e94\u820d\u5f03\u5bb6\u5ead\u5b89\u4fdd\u7cfb\u7edf\uff0c\u7531\u667a\u80fd\u624b\u673a\u7ba1\u7406\u7684\u5e26\u4f20\u7edf\u6709\u7ebf\u62a5\u8b66\u529f\u80fd\u7684\u9632\u76d7\u7cfb\u7edf\u5c31\u80fd\u8d77\u5230\u66f4\u597d\u7684\u4f5c\u7528\u3002\u4f60\u662f\u5426\u6253\u7b97\u4f7f\u7528\u80fd\u770b\u5230\u5bb6\u4eba\u79c1\u751f\u6d3b\uff08\u4f8b\u5982\u5a74\u513f\u76d1\u89c6\u5668\uff09\u7684\u8bbe\u5907\uff1f\u5efa\u8bae\u8003\u8651\u4e00\u4e9b\u6784\u9020\u7b80\u5355\u4e14\u901a\u8fc7\u65e0\u7ebf\u7535\u9891\u7387\u4f20\u8f93\u58f0\u97f3\u7684\u8bbe\u5907\uff0c\u800c\u5e94\u653e\u5f03\u4f7f\u7528\u7f51\u7edc\u6444\u50cf\u5934\u3002<\/p>\n<p>\u2014\u5982\u679c\u4f60\u5bf9\u4e0a\u8ff0\u65b9\u6cd5\u90fd\u4e0d\u611f\u5174\u8da3\u7684\u8bdd\uff0c\u6311\u9009\u667a\u80fd\u8bbe\u5907\u65f6\u8fd8\u9700\u8c28\u614e\u4e3a\u5999\u3002\u5728\u53bb\u5b9e\u4f53\u5e97\u4e4b\u524d\uff0c\u5148\u5728\u7f51\u4e0a\u5bf9\u8bbe\u5907\u8fdb\u884c\u4e00\u4e9b\u7814\u7a76\uff0c\u5c24\u5176\u9700\u8981\u5173\u6ce8\u6709\u5173bug\u548c\u4fee\u590d\u8865\u4e01\u7684\u65b0\u95fb\u3002<\/p>\n<p>\u2014\u5343\u4e07\u4e0d\u8981\u5c1d\u8bd5\u65b0\u4ea7\u54c1\u3002\u8fd9\u4e9b\u65b0\u54c1\u5f80\u5f80\u672a\u7ecf\u5b89\u5168\u4e13\u5bb6\u4eec\u7684\u6d4b\u8bd5\uff0c\u56e0\u6b64\u5176\u4e2d\u7684bug\u4e5f\u65e0\u4ece\u6240\u77e5\u3002\u5c3d\u91cf\u9009\u62e9\u4fe1\u8a89\u826f\u597d\u5382\u5bb6\u751f\u4ea7\u7684\u8bbe\u5907\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4e00\u5e74\u524d\uff0c\u6211\u4eec\u7684\u540c\u4e8bDavid Jacoby\uff08GReAT\u56e2\u961f\u7684\u5b89\u5168\u7814\u7a76\u4e13\u5bb6\uff09\u6210\u529f\u9ed1\u5ba2\u5165\u4fb5\u4e86\u81ea\u5df1\u5bb6\u4e2d\u7684\u5404\u79cd\u8bbe\u5907\uff0c\u540c\u65f6\u8fd8\u6709\u5f88\u591a\u6709\u8da3\u7684\u53d1\u73b0\u3002\u8bb8\u591a\u5361\u5df4\u65af\u57fa\u5b9e\u9a8c\u5ba4\u5458\u5de5\u6df1\u53d7David\u8bd5\u9a8c\u7684\u9f13\u821e\uff0c\u7eb7\u7eb7\u8dc3\u8dc3\u6b32\u8bd5\uff0c\u5728\u81ea\u5df1\u5bb6\u4e2d\u5c55\u5f00\u76f8\u540c\u7684\u8bd5\u9a8c\u3002<\/p>\n","protected":false},"author":40,"featured_media":3633,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1506,1450,1308],"tags":[127,275,871,860,163,180,386,454,748,945],"class_list":{"0":"post-3629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-news","9":"category-privacy","10":"tag-great","11":"tag-275","12":"tag-871","13":"tag-860","14":"tag-163","15":"tag-180","16":"tag-386","17":"tag-454","18":"tag-748","19":"tag-945"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/more-connected-less-secure-how-we-probed-iot-for-vulnerabilities\/3629\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/more-connected-less-secure-how-we-probed-iot-for-vulnerabilities\/5378\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/great\/","name":"GReAT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/3629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=3629"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/3629\/revisions"}],"predecessor-version":[{"id":11104,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/3629\/revisions\/11104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/3633"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=3629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=3629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=3629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}