There will be over 700 million cellular-enabled machine-to-machine (M2M) device adoption and system deployments in the U.S. by 2017. As the volume of M2M devices and associated data increases, so too will the probability of hackers and malware writers targeting these systems to exploit networks, steal data, hijack systems, and compromise workflows. Security specialists recognize the potential risks and are already developing technologies and methodologies for hardening M2M systems from attack. This report examines some common M2M attack vectors and provides solutions for safeguarding against them.

Related research and analysis from GigaOM Pro:
Subscriber content. Sign up for a free trial.