{"id":2499,"date":"2016-10-31T06:15:29","date_gmt":"2016-10-31T06:15:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2499"},"modified":"2020-05-06T10:28:03","modified_gmt":"2020-05-06T17:28:03","slug":"internet-of-things-attacks-are-more-than-a-nuisance","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/","title":{"rendered":"Internet of Things Attacks are More than a Nuisance"},"content":{"rendered":"<p>In 2014 a\u00a0<a href=\"https:\/\/www.cnet.com\/news\/fridge-caught-sending-spam-emails-in-botnet-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">refrigerator was implicated<\/a>\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0<a href=\"https:\/\/www.wired.com\/2015\/12\/2015-the-year-the-internet-of-things-got-hacked\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">researchers exposed security<\/a>\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Company-Blog\/Expert-Perspective-How-to-Defend-Against-the-Next-DDoS-Attack\/ba-p\/8110\" target=\"_self\" rel=\"noopener noreferrer\">How to Defend Against the Next DDoS Attack<\/a>).<\/p>\n<p>The impact of such attacks has grown from a nuisance (spam) to real bottom line impact \u2013 for companies that make their money on adverstising or e-commerce \u2013 network downtime translates to lost revenue immediately. As the use of such devices grows in segments like healthcare and mining the impact goes beyond money \u2013 it could impact human life! While one could argue that eliminating attacks is a myth, it is incumbent upon all of us to make sure that we use every possible avenue to prevent such attacks, detect them quickly when they do happen and are set up to respond rapidly when we do discover them.<\/p>\n<p>On Wednesday, November 2nd, Infoblox\u2019s Chief DNS Architect, Cricket Liu, will share his insights on the recent DDoS attack and discuss best practices during two webinars: \u00a0one at\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1301686\/099D3DF94BF2968A5539D6A637459383?partnerref=DDOS_Webinar_11_2_Press\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">3 p.m. GMT (8 a.m. Pacific Time)<\/a>\u00a0and the second at\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1299687\/E48235FC92BF18EA37E79C3DC15ABA69?partnerref=DDOS_Webinar_11_2_PRESS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">5 p.m. GMT (10 a.m. Pacific Time)<\/a>\u00a0entitled \u201cDon\u2019t Be the Next DDos Attack!\u201d<\/p>\n<p>Cricket will discuss:<\/p>\n<ul>\n<li>Best practices for deploying a DNS architecture<\/li>\n<li>The role DNS security plays in your network infrastructure<\/li>\n<li>The pitfalls you should avoid<\/li>\n<\/ul>\n<p>He will continue the conversation with a Live TweetChat from 11:15-11:45am PDT.\u00a0 You can ask questions or follow the conversation by using the hashtag #DontBeNextDDoS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":2500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[28,70,30,16,73,15,36],"class_list":{"0":"post-2499","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ddi","9":"tag-ddos","10":"tag-dns","11":"tag-infoblox","12":"tag-iot-attacks","13":"tag-security","14":"tag-threats","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Internet of Things Attacks are More than a Nuisance<\/title>\n<meta name=\"description\" content=\"In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0How to Defend Against the Next DDoS Attack).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet of Things Attacks are More than a Nuisance\" \/>\n<meta property=\"og:description\" content=\"In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0How to Defend Against the Next DDoS Attack).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-31T06:15:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prakash Nagpal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prakash Nagpal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/\"},\"author\":{\"name\":\"Prakash Nagpal\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\"},\"headline\":\"Internet of Things Attacks are More than a Nuisance\",\"datePublished\":\"2016-10-31T06:15:29+00:00\",\"dateModified\":\"2020-05-06T17:28:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/\"},\"wordCount\":346,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"keywords\":[\"DDI\",\"DDoS\",\"DNS\",\"Infoblox\",\"IoT Attacks\",\"Security\",\"Threats\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/\",\"name\":\"Internet of Things Attacks are More than a Nuisance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"datePublished\":\"2016-10-31T06:15:29+00:00\",\"dateModified\":\"2020-05-06T17:28:03+00:00\",\"description\":\"In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0How to Defend Against the Next DDoS Attack).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-22.jpg\",\"width\":660,\"height\":454,\"caption\":\"Internet of Things Attacks are More than a Nuisance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/internet-of-things-attacks-are-more-than-a-nuisance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Internet of Things Attacks are More than a Nuisance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0bc58dc788df7ee0d2cae584bf3aa804\",\"name\":\"Prakash Nagpal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g\",\"caption\":\"Prakash Nagpal\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/prakash-nagpal\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Internet of Things Attacks are More than a Nuisance","description":"In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0How to Defend Against the Next DDoS Attack).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/","og_locale":"en_US","og_type":"article","og_title":"Internet of Things Attacks are More than a Nuisance","og_description":"In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0How to Defend Against the Next DDoS Attack).","og_url":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/","og_site_name":"Infoblox Blog","article_published_time":"2016-10-31T06:15:29+00:00","article_modified_time":"2020-05-06T17:28:03+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","type":"image\/jpeg"}],"author":"Prakash Nagpal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Prakash Nagpal","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/"},"author":{"name":"Prakash Nagpal","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804"},"headline":"Internet of Things Attacks are More than a Nuisance","datePublished":"2016-10-31T06:15:29+00:00","dateModified":"2020-05-06T17:28:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/"},"wordCount":346,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","keywords":["DDI","DDoS","DNS","Infoblox","IoT Attacks","Security","Threats"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/","url":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/","name":"Internet of Things Attacks are More than a Nuisance","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","datePublished":"2016-10-31T06:15:29+00:00","dateModified":"2020-05-06T17:28:03+00:00","description":"In 2014 a\u00a0refrigerator was implicated\u00a0in a spam attack involving the distribution of over 750,000 e-mails! The botnet had incoporated about 100,000 devices as part of the attack. This was framed as the first documented attack that involved Internet of Things (IoT) devices. In 2015,\u00a0researchers exposed security\u00a0holes in Wi-fi enabled Barbie dolls and Jeep Cherokees. \u00a0Fast forward to 2016, and an attack that exploited IoT device vulnerabilities and poor network architecture resulted in major brands like Netflix andTwitter and others being severly impacted. This pattern shows that as long as vulnerabilities exist, and bad actors persist such attacks will likely continue to grow in frequency and impact. (You can read my colleague and DNS guru\u2019s perspective on his blog entitled:\u00a0How to Defend Against the Next DDoS Attack).","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-22.jpg","width":660,"height":454,"caption":"Internet of Things Attacks are More than a Nuisance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/internet-of-things-attacks-are-more-than-a-nuisance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Internet of Things Attacks are More than a Nuisance"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0bc58dc788df7ee0d2cae584bf3aa804","name":"Prakash Nagpal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e49d58c89c962f05e0484cf66a404ad87de9505e8c16cb7bc006e4e49c4c1e8e?s=96&d=blank&r=g","caption":"Prakash Nagpal"},"url":"https:\/\/www.infoblox.com\/blog\/author\/prakash-nagpal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2499"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2499\/revisions"}],"predecessor-version":[{"id":2501,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2499\/revisions\/2501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2500"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}