{"id":3871,"date":"2018-06-19T21:05:39","date_gmt":"2018-06-19T21:05:39","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132948"},"modified":"2018-06-19T21:05:39","modified_gmt":"2018-06-19T21:05:39","slug":"when-it-comes-to-iot-security-liability-is-muddled","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/","title":{"rendered":"When It Comes To IoT Security, Liability Is Muddled"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/04\/19104555\/IoT-botnet.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>BOSTON\u2014From hacked connected cars to power grids, the implications of IoT security issues seem to be getting graver \u2013 yet when it comes to pointing fingers for security troubles, many times victims don\u2019t even know where to start.<\/p>\n<p>IoT experts said at the Security of Things Forum today said that a big\u00a0problem, on top of an already lax culture when it comes to securing IoT, is the fact that there are so many different players behind an IoT solution \u2013 and none are viewing security as a shared responsibility.<\/p>\n<p>\u201cThere is no single neck to grab [when it comes to IoT security], which is a lot different than what we\u2019re hearing in the overall market,\u201d said Chris Rezendes of Context Labs.<\/p>\n<p>Rezendes said that he is seeing various companies view responsibility differently when it comes to IoT systems across the insurance, automotive and pharmacy industries \u2013 making it harder to assign onus when security issues arise.<\/p>\n<p>In the automotive industry, for instance, \u201cI guarantee you what they\u2019re talking about is not having the automotive OEMs being the primary source of liability or expectation when it comes to securing a platform,\u201d he said. \u201cIn fact it goes all the way down to who are the code developers that provided the microservice for the specific part that goes into the subsystem; that goes into a system; that goes into a car.\u201d<\/p>\n<p>IoT is difficult because partnerships are not only necessary, but required for IoT devices and systems, from connected cars all the way down to smart thermostats. Even individual IoT devices come with an array of components \u2013 from processors, web services, devices and apps.<\/p>\n<p>Beyond the technology level, what differentiates IoT is that security liability is complex even at a business model level \u2013 and an IoT implementation can involve different manufacturers, as well as OEM or commercial buyers, all the way to end users.<\/p>\n<p>For instance,\u00a0said Chris Cacioppo, CTO of 6 River Systems, smart meters have three varying levels of security: the technology manufacturers behind the meter, the utility companies deploying the product and the end-users who are actually using it.<\/p>\n<p>\u201cThere are three different parties who are responsible for creating delivering and managing IoT: the manufacturers, primary consumers and secondary consumers,\u201d he said. \u201cManufacturers have the responsibility to build security into IoT, but usually people say whoever deploys it takes care of security [in terms of segmenting networks or other security measures]. But, people who are deploying it are pointing back to the manufacturers. [for security].\u201d<\/p>\n<p>This could have dangerous implications when a bad actor sets his sights on the IoT product at the center of confusion.<\/p>\n<p>\u201cit\u2019s not a shared responsibility like it should be,\u201d Cacioppo said.<\/p>\n<p><strong>Security Problems \u2013 No End In Sight<\/strong><\/p>\n<p>The role of responsibility is a large part of security issues when it comes to the IoT. But issues have existed since the start of IoT; taking secure measures is often in the back of the mind for many manufacturers.<\/p>\n<p>It seems like every day a different IoT-connected device is hitting the news for security issues \u2013 from <a href=\"https:\/\/threatpost.com\/google-home-chromecast-leak-location-information\/132912\/\" target=\"_blank\" rel=\"noopener\">Google Home<\/a> devices to <a href=\"https:\/\/threatpost.com\/unbreakable-smart-lock-tapplock-issues-critical-security-patch\/132918\/\" target=\"_blank\" rel=\"noopener\">smart padlocks<\/a>.<\/p>\n<p>The 2016 Mirai\u00a0<a href=\"https:\/\/threatpost.com\/mirai-fueled-iot-botnet-behind-ddos-attacks-on-dns-providers\/121475\/\" target=\"_blank\" rel=\"noopener\">botnet attack<\/a> leveraged as a distributed denial of service \u00a0(DDoS) attack through 300,000 vulnerable IoT devices, like webcams, routers and video recorders \u2014 and it showed just how many IoT devices lacked basic security posture. And it\u2019s not just a manufacturing issue, said Rezendes.<\/p>\n<p>\u201cWe\u2019ve talked to hundreds of VCs, entrepreneurs and manufacturers\u2026 they didn\u2019t care about security,\u00a0it was friction,\u201d said Rezendes. \u201cWe have no idea how you change that culture. The prevailing mindset seems to be, if we don\u2019t have an answer for the issue, don\u2019t expose the issue.\u201d<\/p>\n<p>M. Carlton, chief research officer at Senrio, which recently conducted a <a href=\"https:\/\/blog.senr.io\/blog\/rsa-2018-how-to-daisy-chain-vulnerable-iot-devices-to-hack-a-storage-device\" target=\"_blank\" rel=\"noopener\">lateral attack<\/a>\u00a0proof of concept via an IoT gadget to hack a storage device, shared this sentiment. Senrio\u2019s PoC targeted a vulnerable Axis surveillance camera as an entry point into the network, which then enabled the researchers to compromise a TP-Link Router and access a networked-attached storage device (NAS).<\/p>\n<p>\u201cThere are manufacturers who are taking security more seriously,\u00a0 but there are also some who aren\u2019t there yet when it comes to putting emphasis on security,\u201d Carlton told Threatpost.<\/p>\n<p><strong>How To Assign \u2013 And Uphold Liability?<\/strong><\/p>\n<p>There have been some outcries for a better shared-responsibility model, particularly after Mirai emerged. The\u00a0IoT Cybersecurity Improvement Act of 2017, <a href=\"https:\/\/www.congress.gov\/bill\/115th-congress\/senate-bill\/1691\/text?format=txt\" target=\"_blank\" rel=\"noopener\">introduced<\/a>\u00a0in August 2017, outlined what level of security that IoT devices sold to the U.S. government should have.<\/p>\n<p><a href=\"https:\/\/docs.house.gov\/meetings\/IF\/IF17\/20180522\/108341\/BILLS-115pih-TodirecttheSecretaryofCom.pdf\">A new bill<\/a>, called the State of Modern Application, Research and Trends of IoT Act, would also help hold companies liable and assign responsibility when it comes to security. It would enable Commerce Secretary Wilbur Ross to survey industries using IoT devices to determine how the devices are used and what regulations in each industry exist.<\/p>\n<p>However, progress is slow: the new bill is still in draft form, and the The\u00a0IoT Cybersecurity Improvement Act of 2017 has not yet had a committee hearing.<\/p>\n<p>In the meantime, companies can be taking basic security measures to protect themselves \u2013 from talking to partners to better understand what role each of them plays in an IoT solution, to understanding which IoT devices exist on their networks.<\/p>\n<p>\u201cIt is rule No. 1 to know what\u2019s on your network,\u201d Carlton said. \u201cRun audits, because if you don\u2019t know it\u2019s there, you can\u2019t defend it or keep it up to date.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/when-it-comes-to-iot-security-liability-is-muddled\/132948\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The onus behind IoT security has become so muddled that no one knows who to point fingers at. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3872,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[211,1382,77,1438,1429,236,1439,19],"class_list":["post-3871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-featured","tag-hacked-iot-device","tag-iot","tag-iot-act","tag-iot-botnet","tag-iot-security","tag-security-of-things","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>When It Comes To IoT Security, Liability Is Muddled 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When It Comes To IoT Security, Liability Is Muddled 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-19T21:05:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/when-it-comes-to-iot-security-liability-is-muddled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"When It Comes To IoT Security, Liability Is Muddled\",\"datePublished\":\"2018-06-19T21:05:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/\"},\"wordCount\":920,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/when-it-comes-to-iot-security-liability-is-muddled.jpg\",\"keywords\":[\"Featured\",\"hacked IoT device\",\"IoT\",\"IoT Act\",\"IoT botnet\",\"IoT security\",\"Security of things\",\"Vulnerabilities\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/\",\"name\":\"When It Comes To IoT Security, Liability Is Muddled 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/when-it-comes-to-iot-security-liability-is-muddled.jpg\",\"datePublished\":\"2018-06-19T21:05:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/when-it-comes-to-iot-security-liability-is-muddled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/when-it-comes-to-iot-security-liability-is-muddled.jpg\",\"width\":680,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/when-it-comes-to-iot-security-liability-is-muddled\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Featured\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/featured\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When It Comes To IoT Security, Liability Is Muddled\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When It Comes To IoT Security, Liability Is Muddled 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/","og_locale":"en_US","og_type":"article","og_title":"When It Comes To IoT Security, Liability Is Muddled 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-19T21:05:39+00:00","og_image":[{"width":680,"height":400,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/when-it-comes-to-iot-security-liability-is-muddled.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"When It Comes To IoT Security, Liability Is Muddled","datePublished":"2018-06-19T21:05:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/"},"wordCount":920,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/when-it-comes-to-iot-security-liability-is-muddled.jpg","keywords":["Featured","hacked IoT device","IoT","IoT Act","IoT botnet","IoT security","Security of things","Vulnerabilities"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/","url":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/","name":"When It Comes To IoT Security, Liability Is Muddled 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/when-it-comes-to-iot-security-liability-is-muddled.jpg","datePublished":"2018-06-19T21:05:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/when-it-comes-to-iot-security-liability-is-muddled.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/when-it-comes-to-iot-security-liability-is-muddled.jpg","width":680,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/when-it-comes-to-iot-security-liability-is-muddled\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Featured","item":"https:\/\/www.threatshub.org\/blog\/tag\/featured\/"},{"@type":"ListItem","position":3,"name":"When It Comes To IoT Security, Liability Is Muddled"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3871"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3872"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}