Date: Fri, 29 Jan 2016 13:51:16 -0500 From: Daniel Micay <danielmicay@...il.com> To: oss-security@...ts.openwall.com Subject: Re: shodan.io actively infiltrating ntp.org IPv6 pools for scanning purposes On Fri, 2016-01-29 at 17:45 +0000, Scott Herbert wrote: > That would be nice sure, but given that IoT vendors are rushing so > fast to market that their doing things like sending login credentials > via http, I think we're a long way from having them secure their > products from scanning let alone anything else. Many of them are going to be using the Android-based Brillo so there's a central point to make changes like this (AOSP). Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ