asked 3.0k views
3 votes
a user purchased a new smart home device with embedded software and connected the device to a home network. the user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. which of the following explains how a phishing attack could occur against the user of the smart home device?

1 Answer

5 votes

Answer:

Step-by-step explanation:

Of the user get an email from the Manufacturer which can be a Phishing mail, if the users fall for the trap they can get into the mail and then the Smartphone device , they can start controlling it from there.

answered
User Alex Gartrell
by
7.7k points