Take our user survey and make your voice heard.
tech

Mirai malware simplifies internet attacks like last week's

3 Comments
By BREE FOWLER

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© Copyright 2016 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

©2024 GPlusMedia Inc.

3 Comments
Login to comment

One major question this article failed to ask is why are manufactures of these cheap IoT devices allowed to get away with creating cheap junk that allows such attacks in the first place?

All MAC address ranges have to be issued to manufacturers so it is possible to tell who made every single piece of junk that was compromised.

Any device identified should have its MAC blacklisted from all top level routers. That would force manufactures to up their security game as their junk would no longer work if blacklisted.

0 ( +0 / -0 )

Any device identified should have its MAC blacklisted from all top level routers. That would force manufactures to up their security game as their junk would no longer work if blacklisted.

MAC addresses are not available in incoming connections over the internet, so I don't see how they could do this.

2 ( +2 / -0 )

They would just spoof the MAC address anyway

0 ( +0 / -0 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites