<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Denial of Service on Bill Brown:Thoughts and Reference Material Online</title><link>https://www.billbrown.info/tags/denial-of-service/</link><description>Recent content in Denial of Service on Bill Brown:Thoughts and Reference Material Online</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>BillBrown.info</copyright><lastBuildDate>Thu, 14 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.billbrown.info/tags/denial-of-service/index.xml" rel="self" type="application/rss+xml"/><item><title>IoT Security Threats: Authentication and Denial of Service</title><link>https://www.billbrown.info/post/iot-security-threats-authentication-and-denial-of-service/</link><pubDate>Thu, 14 May 2026 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/iot-security-threats-authentication-and-denial-of-service/</guid><description>
&lt;h2 id="iot-security-threats-authentication-and-denial-of-service"&gt;IoT Security Threats: Authentication and Denial of Service&lt;/h2&gt;
&lt;p&gt;Recent Gartner research predicts that there will be more than 2.9 billion connected IoT devices in consumer smart home environments in 2015. These connected devices could provide a much larger surface for attackers to target home networks (Barcena &amp;amp; Wueest, 2015).&lt;/p&gt;
&lt;p&gt;The use of weak passwords is a security issue that has repeatedly been seen in IoT devices. These devices often do not have a keyboard, so configuration has to be done remotely. Unfortunately, not all vendors force the user to change the devices' default passwords and many have unnecessary restrictions which make the implementation of long, complex passwords impossible (Barcena &amp;amp; Wueest, 2015).&lt;/p&gt;</description></item></channel></rss>