(Source: Enterprise Innovation) The security analysis derived from the aforementioned experiment revealed that software run on these devices were mostly old OS variants and outdated, such as Linux 2.6 or .NET SDK 3.5. In addition, most of them had weak authentication systems with default, unchanged passwords. Additional research also found a …