Filename | Coca-Cola reserved 16 Million MAC addresses to race in 'The Internet of Things' |
Permission | rw-r--r-- |
Author | Unknown |
Date and Time | 1/06/2014 |
Label | Cyber News |
Action |
Ethical Hacking Institute in Pune
./Arizona Team
Have you seen the Coca-Cola "Freestyle" soda fountain yet? Instead of levers for different sodas, you have got a touchscreen, interface like an iPad and with a Push button you can have 127 Flavors of sodas.
There are more than 3,500 such machines are installed inside the world’s Burger Kings and all of them are connected to the internet, so that Coca-Cola can track inventory and making stock decisions.
Last week the developer of GNU MACChanger software, Alvaro Lopez Ortega found that Coca-Cola has reserved a huge block of MAC addresses, i.e. 16 Million. These could conceivably be used in the future for tagging physical devices, Freestyle Soda machines or vending machines.
Media Access Control address, a hardware address that uniquely identifies each node of a network. Every piece of hardware on your local network has a MAC address in addition to the IP address assigned to it by the local router or a server.
IEEE has a Registration Authority called OUI that manages the assignments of 802-defined MAC addresses and usually reserved by companies that sell networking cards and equipment including Apple, HP, IBM, Samsung, Cisco, Intel.
OUI is assigned with MA-L identifier block that can be used to identify an organization/company where a globally unique identifier is needed. In that IEEE MA-L list the Coca-Cola's registration of MAC address is listed as:
FC-D4-F2
The Coca Cola Company
One Coca Cola Plaza
Atlanta GA 30313
UNITED STATES
No Doubt, "The Internet of Things" is already gaining momentum and now Coca-Cola is in the race. The Internet of Things that promises to make life easier in countless ways, but as with any technology seeing an upswing, it’s to be expected that there will be associated security questions and challenges.
All a hacker need is - Search engine like Shodan, designed specifically to locate any devices that have been carelessly plugged into the Internet without much attempt at preventing unauthorized access.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune
./Arizona Team
Have you seen the Coca-Cola "Freestyle" soda fountain yet? Instead of levers for different sodas, you have got a touchscreen, interface like an iPad and with a Push button you can have 127 Flavors of sodas.
There are more than 3,500 such machines are installed inside the world’s Burger Kings and all of them are connected to the internet, so that Coca-Cola can track inventory and making stock decisions.
Last week the developer of GNU MACChanger software, Alvaro Lopez Ortega found that Coca-Cola has reserved a huge block of MAC addresses, i.e. 16 Million. These could conceivably be used in the future for tagging physical devices, Freestyle Soda machines or vending machines.
Media Access Control address, a hardware address that uniquely identifies each node of a network. Every piece of hardware on your local network has a MAC address in addition to the IP address assigned to it by the local router or a server.
IEEE has a Registration Authority called OUI that manages the assignments of 802-defined MAC addresses and usually reserved by companies that sell networking cards and equipment including Apple, HP, IBM, Samsung, Cisco, Intel.
OUI is assigned with MA-L identifier block that can be used to identify an organization/company where a globally unique identifier is needed. In that IEEE MA-L list the Coca-Cola's registration of MAC address is listed as:
FC-D4-F2
The Coca Cola Company
One Coca Cola Plaza
Atlanta GA 30313
UNITED STATES
No Doubt, "The Internet of Things" is already gaining momentum and now Coca-Cola is in the race. The Internet of Things that promises to make life easier in countless ways, but as with any technology seeing an upswing, it’s to be expected that there will be associated security questions and challenges.
All a hacker need is - Search engine like Shodan, designed specifically to locate any devices that have been carelessly plugged into the Internet without much attempt at preventing unauthorized access.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune