In terms of technical risk, attacks against the IoT devices
should be considered. Many well-publicized attacks
against embedded systems illustrate how these types
of attacks can detrimentally impact IoT computing. For
example, Spanish security researchers Javier VazquezVidal
and Alberto Garcia Illera developed the CAN Hacking
Tool (CHT) from off-the-shelf electronic components. This
tool is a proof of concept of hacking a car and wirelessly
interacting with it in ways that can make operation
potentially unsafe.22