• About
  • Advertise
  • Contact
Friday, April 24, 2026
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Internet of Things

Report: Surveillance cameras most dangerous IoT devices in enterprise

in Internet of Things
0 0
0
SHARES
12
VIEWS
Share on FacebookShare on Twitter

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a new report by Zscaler.

“I would consider the entire video camera category as particularly dangerous,” said Deepen Desai, director of security research at Zscaler.

Take, for example, the Flir FX wireless HD monitoring camera.

Researchers found that the camera communicated with the parent company in plain text and without authentication tokens.

“The firmware that was being updated was not being digitally signed,” said Desai.

That means that attackers have the opportunity to introduce their own, malicious firmware instead, he said.

Another camera, the Foscam IP surveillance camera, connects to a web server to stream video to users’ desktops or smartphones. That can be a useful feature, but the user credentials, including the password, are transmitted in plain text, over HTTP, right in the URL.

The Axis camera has a remote management console, but it uses basic HTTP authentication, allowing sniffing and man-in-the-middle attacks.

Zscaler also found that consumer devices frequently appeared inside enterprises, such as the Chromecast and Roku media players and smart TVs.

Zscaler didn’t find any security issues with either the Chromecast or the Roku, but the smart TVs used outdated libraries which could be used to get control of the system.

Late last month, a botnet that infected networked devices, cut off access to large areas of the Web. But this isn’t actually the biggest threat that vulnerable IoT devices pose for enterprises, Desai said.

But when Zscaler analysed the traffic from enterprise devices, and correlated it with DDoS attacks, there were no spikes.

“Based on the analysis that we did, none of the devices that were in our customers’ enterprise networks were affected,” Desai said. “My take on that is that enterprises had their IoT devices properly segmented in the network. The way that the Mirai botnet was propagating, it was preying on weak and default connections.”

But just because the most recent round of attacks did not reach these devices, doesn’t mean that companies should get complacent. And the risks are much higher than simply having a device in a network that acts as a DDoS message relay.

An infected device can be an access point into an enterprise network. And an infected camera can do even more damage.

“If an attacker got access to your video camera, they could see what’s going on in the environment,” he said.

So for example, they can see when particular areas are unguarded, to plan both physical attacks and cyber attacks.

Desai suggested that enterprises restrict access to IoT devices as much as possible, by blocking external ports or isolating devices on isolated networks, to prevent lateral movement. They should also change default credentials, and set up a process to apply regular security and firmware updates.

This story, “Report: Surveillance cameras most dangerous IoT devices in enterprise” was originally published by

CSO.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Free Download WordPress Themes
Download Best WordPress Themes Free Download
Download Premium WordPress Themes Free
Download WordPress Themes Free
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
download mobile firmware
Premium WordPress Themes Download
free online course
Tags: Report: Surveillance cameras most dangerous IoT devices in enterprise
Next Post

GE wants Predix to be the Windows of industrial IoT

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In