Your IP camera is a computer

November 2015 News & Events

It’s a sad fact that in the security industry, cost more often than not clinches the deal. This is not always the case as there are some people out there buying security because they know what they want to get out of it, but in many cases it is still a grudge purchase and the cheapest offer wins – or the guy who knows the guy and/or sweetens the deal, wins.

A couple of decades ago this may have been acceptable, but not today. In a world where everything is connected, you can’t leave vulnerabilities open to exploitation because they will be exploited. Take the example of Hikvision a few months ago when its cameras were used to compromise a network. The issue was publicised and Hikvision’s name was associated with the breach, but in the end it was not the camera manufacturer’s fault.

In this particular instance, the installer hadn’t bothered to change the default password on the IP cameras, allowing hackers to easily access the cameras and then the network. Hikvision has since said it is updating its firmware to ensure that installers have to change the password when installing a camera. Unfortunately this won’t help unless the installer uses a decent password and not “password” for every camera. And that won’t happen unless the customer insists on strong passwords and actually manages the process to ensure it’s done.

Another more recent example comes from Israel where researchers found malware had been installed on a mall’s cameras – again the default passwords were left in place by an irresponsible installer – and the cameras were used to launch a denial of service attack. The attack was launching about 20 000 requests per second from around 900 IP cameras in this particular mall and other cameras around the world – a global CCTV attack. (You can see more at https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html, short URL: https://goo.gl/NEh0Kp).

Identity and access

And on the subject of access and identity, our Access & Identity Management Handbook 2016 is being posted at the same time as the November issue, so make sure you get yours. It has 144 pages of information, trends and products to ensure you get a head start on access control in 2016. As always comments are welcome at [email protected]

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...