Every networked sensor package in your immediate vicinity can be used to spy on you unless it is well-designed and transparent to you and the wide community of security researchers. If that sounds paranoid, check out the video above, wherein some security researchers show that they can covertly operate WiFi-enabled personal cameras and turn them into bugs.
But, as proven by Daniel Mende and Pascal Turbing, security researchers with German-based IT consulting firm ERNW, these capabilities also have security flaws that can be easily exploited for turning these cameras into spying devices.
Mende and Turbing chose to compromise Canon's EOS-1D X DSLR camera an exploit each of the four ways it can communicate with a network. Not only have they been able to hijack the information sent from the camera, but have also managed to gain complete control of it.
In this presentation from Shmoocon 2013, they explained in detail how they managed to mount the attacks, and have also offered advice for users on how to secure their cameras and connections against these and similar attacks.
Stuff like this is why DRM and EULAs are so insidious. The existence of devices that attack their owners affects us all. It is a public health problem. Any time we pass a law that makes it illegal or legally perilous to point out flaws in technology, we make it harder to solve the public health problem, and we're all at risk.
Digital cameras easily turned into spying devices, researchers prove
“The tactic, which experts in mobile-phone security said was concealed through an unusual added layer of encryption, appears to have violated Google policies”
Hackers working for China’s government targeted firms working on coronavirus vaccines, and stole hundreds of millions of dollars worth of intellectual property and trade secrets, claims the Justice Department in a statement Tuesday announcing criminal charges.
This is quite a major hack. Now is a good time to change your Twitter password, if you are a user. Hackers pumping a cryptocurrency giveaway scam appear to have compromised the Twitter accounts of leading exchanges, prominent individuals, major corporations, and at least one news organization.
Physics may have been that class you sleepwalked your way through in high school. But while it might have just slipped under your radar throughout your academic career, you probably shouldn’t have given it such shallow attention. Sure, we could focus on the immediate pluses of a career as a physicist, like the more than […]
If you’re out of work…well, first, you have our sympathies. Right now, about 31 million Americans are drawing some form of unemployment benefits, which makes competition for virtually any job savagely fierce. But since nobody wants to wallow in the miseries of unemployment, the only legitimate course left open is to scrap like crazy to […]
If you want swole arms cut like tree trunks, you start savaging the curl bars. If you want to sculpt a tight, firm core, you have lots of planking and bridges in your future. So what do you do if you want to knock out that double chin? Or put a little added definition into […]