Remove Information Security Remove Internet Remove IoT Remove Surveillance
article thumbnail

An RCE in Annke video surveillance product allows hacking the device

Security Affairs

Researchers from Nozomi Networks discovered a critical vulnerability that can be exploited to hack a video surveillance product made by Annke. The vulnerability, tracked as CVE-2021-32941 can be exploited by an attacker to hack a video surveillance product made by Annke, a provider of home and business security solutions.

article thumbnail

Kalay cloud platform flaw exposes millions of IoT devices to hack

Security Affairs

FireEye Mandiant researchers have discovered a critical vulnerability in the Kalay cloud platform that exposes millions of IoT devices to attacks. The flaw could be easily exploited by a remote attacker to take over an IoT device, the only info needed for the attack is the Kalay unique identifier (UID) of the targeted user.

IoT 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

article thumbnail

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

And do security and privacy have a seat at the table at the world's largest electronics event? We sit down with IoT luminary and. » Related Stories Spotlight: as Attacks Mount, how to secure the Industrial Internet Die Hard is a Movie About Building Automation Insecurity. Read the whole entry. »

article thumbnail

FBI warns swatting attacks on owners of smart devices

Security Affairs

According to the alert issued by the FBI, the swatters have been hijacking smart devices such as video and audio capable home surveillance devices. “Recently, offenders have been using victims’ smart devices, including video and audio capable home surveillance devices, to carry out swatting attacks.

Passwords 135
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Pictured: a Dome Series security camera from Verkada. A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., When surveillance leads to spying. Thought leaders advise reducing or eliminating the use of these skeleton key-like accounts.

article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

“These vulnerabilities could impact access to a vehicle fuel supply, vehicle control, or allow locational surveillance of vehicles in which the device is installed.” Successful exploitation of these vulnerabilities may allow a remote actor to exploit access and gain control the global positioning system tracker.”