Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Monday, August 30, 2021

Security camera hacking: Here's how to stop it from happening to you

Photo by www.Depositphotos.com (image)

#Security #camera hacking: Here's how to stop it from happening to you
| #TpromoCom #CyberSecurity | #Hackers can compromise your home security and privacy. A few basic measures can make it a lot harder for them. https://bit.ly/3zuuYpH

Last year, an ADT home security customer noticed an unfamiliar email address connected to her home security account, a professionally monitored system that included cameras and other devices inside her home. 

That simple discovery, and her report of it to the company, began to topple a long line of dominoes leading back to a technician who had spied, over the course of four and a half years, on hundreds of customers -- watching them live their private lives, undress and even have sex.

To read the remainder of this news story: 


XS01-WT WiFi Smoke Detector





Follow us on Social Media or email us:

Monday, August 23, 2021

Video surveillance network hacked by researchers to hijack footage

Video surveillance network hacked by researchers to hijack footage, Nakedsecurity (image)

Video surveillance network hacked by researchers to hijack footage | #TpromoCom #VideoSurveillance #CCTV #Hacker #Hackers #CyberSecurity | Researchers at security company Mandiant have written up a report about a device-hijack bug in a video sharing and surveillance network called Kalay (nakedsecurity). https://bit.ly/3sDSsWJ

Operated by Chinese smart device company ThroughTek, Kalay (which apparently means “handshake” in the Dawu language) is pitched as a cloud-based solution for vendors of home automation devices, including security cameras, smart locks, video doorphones, smart power plugs, and even personal cloud storage hardware such as NAS devices.

As you can see, the idea is that instead of creating their own protocol, setting up their own... (read more)

Bitdefender 2020 728x90



Follow us on Social Media or email us:

Monday, August 16, 2021

Morse Code Used by Hackers in Phishing Attacks

#Hackers Spotted Using Morse Code in #Phishing Attacks to Evade Detection
| #TpromoCom #CyberSecurity #CyberCrime | Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. https://bit.ly/3yNfWed

The phishing attacks take the form of invoice-themed lures mimicking financial-related business transactions, with the emails containing an HTML file ("XLS.HTML"). 

The ultimate objective is to... (read more)

Bitdefender 2020 728x90


Follow us on Social Media or email us:

sm081621A

Monday, August 9, 2021

3 hackers held for hacking Shwapno’s system

3 hackers held for hacking Shwapno’s system Staff Correspondent | Published: 20:27, Aug 08,2021 (image)

3 #hackers held for #hacking Shwapno’s system | #TpromoCom #CyberSecurity #CyberCrime | The police on Saturday night arrested three members of a hackers’ group who hacked the digital system of Shwapno and generated illegal digital vouchers worth Tk 18 lakh, said a press release. https://bit.ly/3CIE97Y

The arrested are M Nasimul Islam, Rehanur Hasan Rashed and Raisul Islam. 

The Dhaka Metropolitan Police’s Counter Terrorism and Transnational Crime Unit chief and additional police commissioner M Asaduzzaman disclosed the information of their arrests at a press conference on Sunday. (read more)





Follow us on Social Media or email us:

Monday, January 11, 2021

The SolarWinds hack seems to be breathing new life into the supply chain security effort.

The #SolarWinds hack seems to be breathing new life into the supply chain #security effort
| #TpromoCom #CyberSecurity | The General Services Administration could soon start requiring on-site assessments of certain federal contractors under a new program to scrutinize risks to the supply chain https://bit.ly/39oAaiL

Tucked into the draft of a new governmentwide acquisition vehicle for information technology services called Polaris is language describing a tool to “identify, assess and monitor supply chain risks of critical vendors.” It would use classified and unclassified sources.

GSA said once the tool it’s developing—referred to as the Vendor Risk Assessment Program—is complete, “the contractor agrees


Follow us on Social Media or email us:

Saturday, December 19, 2020

Integrators: Beware More Supply Chain Cyber Attacks



Integrators: Beware More Supply Chain Cyber Attacks
 
| #TpromoCom #SolarWinds #Hacker #Hackers #CyberSecurity | The SolarWinds hack is an example of a supply chain attack that integrators and AV software companies need to defend against.

The recent news of a large-scale attack on the part of a foreign government utilizing popular network monitoring tools should have integrators questioning the security of the remote monitoring tools they use.

U.S. government officials, cybersecurity experts and tech giants are working around the clock to uncover more evidence and possibly other supply chain attack vectors after IT software company SolarWinds disclosed that versions of its popular Orion product was compromised by foreign cyber actors.

Read the remainder of this Commercial Integrator news story here: