IOT VULNERABILITIES