Suivre

The protocol used by ThroughTek lacks a secure key exchange. It relies instead on an obfuscation scheme based on a fixed key. The risk of using vulnerable cameras is unauthorized access to confidential audio/video camera feeds. For critical infrastructure operators, this could reveal sensitive business, production and employee information. P2P is used by multiple camera vendors and today's disclosure is another reason to check whether your CCTV solution has this feature.

nozominetworks.com/blog/new-io

Inscrivez-vous pour prendre part à la conversation
nanao

Comme le soleil, les machines ne se couchent jamais.