Hackers convert Google's Dropcam into Spycam

Hackers could serve fake videos by doing it Injectable  in the popular home tracking kit Dropcam. Immediately after, they can use the system to attack , η να κάνουν μια ληστεία, αναφέρουν οι Patrick Wardle and Colby Moore.

dropcam

Attacks presuppose that attackers have physical access to devices, and exploits use Heartbleed vulnerability.

Dropcam is one video surveillance company that was last month bought by Google's Nest Labs for $555 million.

Wardle (@patrickwardle) and Moore (@colbymoore) of the security company Synack, based in ,κατάφεραν με reverse-engineering, (αντίστροφη μηχανική) στο υλικό και στο λογισμικό του Drοpcam να εμφυτεύσουν on the devices. In this way they can attack homes or even corporate networks.

"If anyone has physical access, the game is over," Wardle told DarkReading.

"The camera is vulnerable to Heartbleed client-side attacks. You could be fooling Dropcam DNS server. ”

The duo will describe the vulnerability of Dropcam during the speech " Optical surgery; Implanting DropcamAt the upcoming DEF CON 22 conference in Las Vegas next month.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).