(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-NG2RVR'); .async-hide { opacity: 0 !important} (function(a,s,y,n,c,h,i,d,e){s.className+=' '+y; h.end=i=function(){s.className=s.className.replace(RegExp(' ?'+y),'')}; (a[n]=a[n]||[]).hide=h;setTimeout(function(){i();h.end=null},c); })(window,document.documentElement,'async-hide','dataLayer',4000,{'GTM-NG2RVR':true}); window.addEventListener("load", function(){ window.cookieconsent.initialise({ "cookie": { "name": "int_cookieconsent_status", "domain": "integrate-expo.com", "expiryDays": 3650 }, "palette": { "popup": { "background": "#000" }, "button": { "background": "#f66666" } }, "theme": "classic", "position": "bottom-right", "content": { "message": "This website uses cookies for proper functioning and enhancing the user experience. By clicking ‘Accept’ on this banner or using our site you accept our use of cookies.\nYou can also ‘Read More’ to view our Cookie Policy and learn how to control them.\n", "dismiss": "Accept", "link": "Read More", "href": "https://integrate-expo.com/cookie-policy/" } })}); piAId = '1014352'; piCId = ''; piHostname = 'go.integrate-expo.com'; (function() { function async_load(){ var s = document.createElement('script'); s.type = 'text/javascript'; s.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + piHostname + '/pd.js'; var c = document.getElementsByTagName('script')[0]; c.parentNode.insertBefore(s, c); } if(window.attachEvent) { window.attachEvent('onload', async_load); } else { window.addEventListener('load', async_load, false); } })();
21-23 Aug 2024
ICC, Sydney

Webcams, Video Conferencing, Smart Security: All Hackable in Less Than 3 Minutes

Oct 28, 2016

Seven common enterprise Internet of Things (IoT) devices, including IP-connected security systems, smart HVACs and energy meters, video conferencing systems and connected printers, have proven to be hackable in less than three minutes.

In tests by ForeScout Technologies and ethical hacker Samy Kamkar (including a physical test situation and analysis from peer-reviewed industry research), the devices were shown to lack embedded security. Some were outfitted with rudimentary security, but Kamkar’s analysis revealed many were found to be operating with dangerously outdated firmware. All of them pose significant risk to the enterprise.

Kamkar’s research included a physical hack into an enterprise-grade, network-based security camera. Entirely unmodified and running the latest firmware from the manufacturer, the camera proved itself vulnerable and ultimately allowed for the planting of a backdoor entryway that could be controlled outside the network. using the very same method that caused the Dyn DDoS attack: exploiting the default password.

View the full article at InfoSecurity Magazine here

You may also like
Most Read
  • Stay up to date with the latest news, industry insights and Integrate updates.
  • Subscribe
Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×