SHARE
Facebook X Pinterest WhatsApp

Hackers Taking Advantage of Unsecured Appliances

Top Five Emerging Malware Threats Businesses are generally cognizant of the security threats to their PCs, and will put the appropriate anti-malware software and firewall in place to protect themselves. However, a new attack vector has emerged of late that could catch SMBs off guard. The issue has its roots in the growing sophistication and […]

Written By
thumbnail
Paul Mah
Paul Mah
Apr 18, 2013
Slide Show

Top Five Emerging Malware Threats

Businesses are generally cognizant of the security threats to their PCs, and will put the appropriate anti-malware software and firewall in place to protect themselves. However, a new attack vector has emerged of late that could catch SMBs off guard.

The issue has its roots in the growing sophistication and capabilities of IT appliances and devices that are deployed in corporate networks. Perhaps unavoidably, this increased complexity is paralleled by an uptick in the likelihood of security vulnerabilities and misconfigurations surfacing.

And since these devices can generally be accessible over the Internet, the possibility of hackers gaining remote access to them is hence very real. This concern is not a theoretical one either, given recent reports of vulnerabilities found in IP cameras, as well as in misconfigured videoconferencing systems.

The latest example of the former involves cameras sold under the Foscam brand in the U.S., as reported by Computerworld. In a nutshell, wireless network cameras configured to use the manufacturer’s dynamic DNS service are susceptible to discovery over the Internet. Security firm Qualys – which discovered the weakness – says that two out of 10 cameras using the service accept the default “admin” username with an empty password string. Other flaws allow a memory dump to be made, or even the firmware to be altered.

This is not the first time that major problems were discovered in a popular appliance. In February this year, 22 models of network cameras from Trendnet were found to contain a serious software flaw that allowed its video feed to be accessed online in real time without the need for a password.

Where misconfigurations are concerned, security researcher HD Moore in January identified 5,000 videoconferencing systems that were set to automatically answer calls. Moore noted that hackers could dial in to such systems to listen in on privileged boardroom conversations, or activate the high-resolution video cameras to read email and other confidential materials from the screens of laptops.

Indeed, the discovery of security flaws and misconfigurations can only increase as manufacturers incorporate more powerful microprocessors into the tech devices that they make. To harness this processing capability, customized versions of the Linux operating system and other embedded systems are finding their way into networked devices. These inevitably result in the devices inheriting any existing flaws, as well as gaining new ones that may result from implementation mistakes.

Ultimately, there is no foolproof method that SMBs can employ to defend themselves from vulnerabilities that they may not even know exist. Some simple steps can go a long way towards increasing their security, however. These include ensuring that the latest firmware is installed, passwords are always be set, and where possible, the username with administrative access should be changed from defaults such as “admin” to something less obvious.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.