The weaponization of IoT devices

The weaponization of IoT devices Threat actors use botnets - networks of infected computers - for various cybercriminal purposes, most significantly distributed denial of service attacks against predefined targets. Today, botnets with distributed denial of services (DDoS) capabilities are even for sale on the Dark Web. How has this threat evolved? One of the most important changes, the rising use of compromised Internet of Things devices in botnet operations, is the focus of this report.

Download the whitepaper to learn more

IBM may use my contact data to keep me informed of products, services, and offerings

You can withdraw your marketing consent at any time by sending an email to NETSUPP@us.ibm.com. Also you may unsubscribe from receiving marketing emails from IBM by clicking the unsubsctribe link in each such email.

More information on IBM processing of your personal data can be found in the IBM Privacy Statement. By submitting this form I acknowledge that I have read and understand the IBM Privacy Statement

By submitting this form, you agree to have your contact information passed along for the purpose of following up on your interests and in order receive communications regarding IBM products, services, and events. The data sent will be processed in Canada and provided to IBM who will assume responsibility for processing and Opt-out and Information Removal. For more information, please read our Terms of Use, Privacy, Opt-out & Information Removal below.