jfruh writes: We already have the Internet of Things, so why not the Security Breaches of Things? A security research firm released a case study of a company that ordered inventory scanners that ended up coming already infected with malware. Once the scanners were connected to the company's wireless network, the malware searched out Linux-based ERP servers with "finance" in their names and then went after known security holes.
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×