Your IP camera is a computer

November 2015 News & Events

It’s a sad fact that in the security industry, cost more often than not clinches the deal. This is not always the case as there are some people out there buying security because they know what they want to get out of it, but in many cases it is still a grudge purchase and the cheapest offer wins – or the guy who knows the guy and/or sweetens the deal, wins.

A couple of decades ago this may have been acceptable, but not today. In a world where everything is connected, you can’t leave vulnerabilities open to exploitation because they will be exploited. Take the example of Hikvision a few months ago when its cameras were used to compromise a network. The issue was publicised and Hikvision’s name was associated with the breach, but in the end it was not the camera manufacturer’s fault.

In this particular instance, the installer hadn’t bothered to change the default password on the IP cameras, allowing hackers to easily access the cameras and then the network. Hikvision has since said it is updating its firmware to ensure that installers have to change the password when installing a camera. Unfortunately this won’t help unless the installer uses a decent password and not “password” for every camera. And that won’t happen unless the customer insists on strong passwords and actually manages the process to ensure it’s done.

Another more recent example comes from Israel where researchers found malware had been installed on a mall’s cameras – again the default passwords were left in place by an irresponsible installer – and the cameras were used to launch a denial of service attack. The attack was launching about 20 000 requests per second from around 900 IP cameras in this particular mall and other cameras around the world – a global CCTV attack. (You can see more at https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html, short URL: https://goo.gl/NEh0Kp).

Identity and access

And on the subject of access and identity, our Access & Identity Management Handbook 2016 is being posted at the same time as the November issue, so make sure you get yours. It has 144 pages of information, trends and products to ensure you get a head start on access control in 2016. As always comments are welcome at [email protected]

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...