Level 8 and just why folks are the Most Important Security device Currently, all recognized IoT botnets crop zombies through telnet with hardcoded or poor credentials. Once this ripple bursts, the next step would be exploiting various other, most changed vulnerabilities that may give power over a large number of devices. Contained in this talk,...