PeterJames Posted January 29, 2013 Posted January 29, 2013 http://it.slashdot.org/story/13/01/29/0111238/58000-security-camera-systems-critically-vulnerable-to-attackers
Joe Harris Posted January 29, 2013 Posted January 29, 2013 Who would have guessed..... (Returns to bashing head on wall)
Oxo Posted January 29, 2013 Posted January 29, 2013 And as one wit said, lets find the strip clubs IPs.
MrHappy Posted January 29, 2013 Posted January 29, 2013 By checking the web interfaces of the vulnerable devices and analyzing the Ray Sharp firmware he downloaded from Swann’s website, Moore was able to identify 18 companies that seem to use the faulty code: Swann, Lorex, URMET, KGuard, Defender, DSP Cop, SVAT, Zmodo, BCS, Bolide, EyeForce, Atlantis, Protectron, Greatek, Soyo, Hi-View, Cosmos, and J2000 Urmet ? Wonder who elese has rebranded kit only to find it not quite as secure as they expect ? Mr Veritas God
james.wilson Posted January 29, 2013 Posted January 29, 2013 Do we know of anyone here uses those machines. I dont use anything that needs port 9000 also carrying on from joes blog, it shows people are testing the security of these devices and trying to hack them. Does anyone firmware upgrade on service? securitywarehouse Security Supplies from Security Warehouse Trade Members please contact us for your TSI vetted trade discount.
sixwheeledbeast Posted January 29, 2013 Posted January 29, 2013 Do we know of anyone here uses those machines. I dont use anything that needs port 9000 also carrying on from joes blog, it shows people are testing the security of these devices and trying to hack them. Does anyone firmware upgrade on service? Likewise not used any of them or port 9000 for that matter. Never firmware updated a DVR yet, however not got a huge amount connected to inet.
21ninja Posted January 29, 2013 Posted January 29, 2013 Do we know of anyone here uses those machines. I dont use anything that needs port 9000 also carrying on from joes blog, it shows people are testing the security of these devices and trying to hack them. Does anyone firmware upgrade on service? We don't use anything with port 9000. We don't do any firmware upgrades unless required for new features.
Recommended Posts
Archived
This topic is now archived and is closed to further replies.