![]() ![]() On February 7th, The BBC published an article about the controversy reporting that Trendnet had immediately addressed the issue by releasing an updated version of the firmware. ![]() On February 3rd, the tech news blog The Verge published a post about the security flaw, noting that links to compromised video feeds were being shared on sites like Reddit and 4chan. The exploit was turned into a script utilizing Shodan search to discover other vulnerable cameras connected to the Internet. ![]() On January 10th, 2012, a hacker using the handle “someLuser” published a blog post about a security vulnerability he discovered in the firmware of Trendnet home surveillance webcams, which would allow Internet users to anonymously access video feeds using a URL. On February 24th, 2011, YouTuber softgens uploaded a video presentation about Shodan, which demonstrated its ability to discover vulnerable computer systems (shown below). Seems its B88 Cyclotron: I've already contacted US-CERT- Ruben Santamarta April 24, 2010 On April 24th, cyber security researcher Ruban Santamarta tweeted that he had located a control system for a particle-accelerating cyclotron by using Shodan. On February 23rd, Matherly submitted a link to ShodanHQ in a post titled “search engine for hackers” on /r/netsec subreddit, where it received over 150 up votes and 35 comments. ![]() On November 25th, Intern0t Forums member s3my0n created a thread about Shodan, which sparked a discussion about whether it would be abused by malicious hackers known as "script kiddies." On February 18th, 2010, the engine relocated to the domain ShodanHQ. In November of 2009, computer programmer John Matherly hosted an early version of the Shodan computer search engine on the website Sutri. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |