Hackers hacked a Foscam Baby Monitor

Computerworld has the story: http://www.computerworld.com/article/2878741/hacker-hijacks-wireless-foscam-baby-monitor-talks-and-freaks-out-nanny.html?utm_source=dlvr.it&utm_medium=twitter#tk.rss_all    We have posted about this before Jun11, 2014 http://oversitesentry.com/what-if-your-new-gadget-gets-hacked-even-your-countertop-or-toilet/ The creepy hacker said some words to the nanny and caused the nanny to turn off the webcam. There seems to be a sad theme here as well as our post(Nov16) of regular webcams (not just babycams) http://oversitesentry.com/change-default-passwords-online-cams/ It seems it … Read more

Anonymity is History: Getting Doxed

What does Dox mean? http://www.urbandictionary.com/define.php?term=dox defines dox as personal information about people on Internet, including real name, known aliases, address, phone number, SS#, cc#, etc. So if you think you can keep your data secret or at least not public (the old method was delist your name and address from phone book) today everyone leaves a trail … Read more

Good Day For Reflection: Improve Cloud Security

It’s good to do some reflection, and this is the last Saturday of he month, so here we are.   Securosis’  Rich latest post https://securosis.com/blog/summary-heads-up has a decent summary post, which is discussing what to do periodically – review current technologies and methods and see if those methods can improve your current operational methods and … Read more

Why is Cybersecurity hard? XXE injection

Where do we start? In the beginning …  well, fortunately we do not have to talk creation or evolution, let’s just go back to early 90’s when the Microsoft Windows Operating system hit a large market share of all personal computing systems. If you look at the early Windows systems, they were not built out … Read more

Ghost: glibc vulnerability CVE2015-0235

How dangerous is it?  It is an inherent Linux glibc vulnerability. RedHat is discussing it on their articles page – has the CVE number 2015-0235 https://access.redhat.com/articles/1332213 It is nicknamed “Ghost” due to the ghostbyname() function calls in the glibc library, specifically: “GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the … Read more