Tag Archive for Samsung

COVID On Your Cell Phone

COVID On Your Cell PhoneAmid the chaos of the COVID-19 lock-down one of your only allies in the social distancing campaign is your cell phone. Right? After all, everybody is attached to their mobile phone. In fact, research has shown that millennials check their phones 150 times a day (PDF). Why do we check our cell phones so much?

Researchers from the University of Illinois found in a recent study that 37% of women and 30% of men walking down the street have a smartphone in their hand. The UofI researchers Laura Schaposnik and James Unwin paper The Phone Walkers: A study of human dependence on inactive mobile devices propose four plausible reasons that pedestrians practice this behavior.

Appeasement – The first proposal is that we need immediate access to our phones now because so much of our social lives exist on the phone. In particular, research suggests that people in romantic relationships expect to be texted back within five minutes. We keep our phones out to appease partners.

anxiety if separated from mobile phonesAnxiety – The researcher’s next hypothesis was that we might be psychologically dependent on these phones to the point that we have anxiety if we’re separated from them. The researchers write. “… the simple manipulation of the object could lead to a corresponding decrease in tension or anxiety ….”

Safety – Personal safety is another distinct possibility. Research has found that technology gives young people confidence when facing the potential dangers of crime in a public place. The UofI team says we “..may hold their phones both for personal reassurance against perceived threats and as a visible warning sign to potential assailants.

peacock effectThe peacock effect – We might want to impress a possible partner with our fancy phones. The researchers compared the phenomenon to “displays of affluence by wearing designer fashion clothes or jewelry … to enhance or affirm a person’s social standing and to attract a suitable mate.

We are addicted to our cell phones so what? I have covered the germiness of mobiles on the Bach Seat before. But in the wake of recent events, I checked on current thinking and found that COVID-19 is probably on your mobile. German researchers reported (PDF) in the Journal of Hospital Infection that Coronaviruses can live on inanimate surfaces like metal, glass, or plastic, and remain infectious “from 2 hours up to 9 days.

Coronaviruses can live on surfaces like metal, glass, or plastic, and remain infectious "from 2 hours up to 9 days."Lead researcher Günter Kampf, M.D., an associated professor at the University of Greifswald, reported that a good strategy for surface disinfection is with a solution that contains 0.1% sodium hypochlorite or 62 to 71% ethanol. Either of these “significantly reduces coronavirus infectivity on surfaces within 1 min exposure time.

Charles Gerba, Ph.D., professor of microbiology and immunology at The University of Arizona, told Mens Health

…What we found … in office buildings is that you touch a surface with a virus on it and then you place it on your cell phone.” (A door handle, for example.) … You then go home or to another location and you touch your phone again a touch a table moving it to another location—great way to spread viruses around an office.

great way to spread viruses around an officeDr. Kampf warns,Check with the manufacturer. First, it should be effective against coronavirus … Second, not all disinfectants are compatible with the material of the smartphone surface.

Professor Gerba recommends an alcohol wipe or a microfiber cloth. “I would do it every time I have been out in public,” he says.

rb-

To safely clean your mobile:

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Biometrics Hype

Biometrics HypeFollowers of the Bach Seat know biometrics have a limited value in replacing passwords. Despite the technical flaws another round of biometric hype is rolling across the Intertubes. The latest round of biometric hype is coming from Samsung (005930). In the hope to revive their brand, Samsung has released the Galaxy S8. The Samsung Galaxy S8 includes the ability to use facial recognition software to unlock your brand new phone. CNet says that this idea “sounds awesome.”

However, this awesome idea appears to lower the bar for your security. CNet reports that the video blogger MarcianoTech demonstrated a pre-release version of the Galaxy S8 being unlocked using just a photo (at the 1:09 mark). To their credit, Samsung has acknowledged that the Face Unlock feature is more for convenience than for security. The biometric feature cannot be used for mobile payments. While weak facial recognition software may be a convenience for the user, it could also be very convent for others, too.

The troubles with Face Unlock date back to 2011.  In 2011 SlashGear reported that Google (GOOG) admitted the security system could be fooled by a picture of you and not the real thing. CNet reports that the technology was developed by PittPatt, a startup originating from Carnegie Mellon University, which was later acquired by Google.

FBI’s facial recognition database

Next Generation Identification databaseThe Guardian reports during testimony before congress the FBI admitted that about half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports from 18 states including Michigan.

The FBI first launched its advanced biometric database, Next Generation Identification (NGI), in 2010. NGI augmented the old fingerprint database with further capabilities including facial recognition. The bureau did not tell the public about its newfound capabilities nor did it publish a privacy impact assessment, required by law, for five years.

Unlike with the gathering of fingerprints and DNA, which is done following an arrest, photos of innocent civilians are being collected proactively. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos.

 

“I’m frankly appalled,” said Paul Mitchell, a congressman for Michigan. “I wasn’t informed when my driver’s license was renewed my photograph was going to be in a repository that could be searched by law enforcement across the country.

rb-

So anyone with a photo of you, or maybe even just access to your Facebook (FB) photos, could potentially access your phone. There are two important reasons why biometrics won’t work, and why the old-fashioned password is still a better option: a person’s biometrics can’t be kept secret and they can’t be revoked.

 

no real way to hide biometric data from the worldPeople expose their biometrics everywhere – they leave fingerprints behind at bars and restaurants, their faces and eyes are captured in photos and film, etc. There’s no real way to hide this data from the world. As far back as 2002, research led by Japanese cryptographer Tsutomu Matsumoto. Matsumoto and his team gummy bears to make artificial fingers that they then used to fool fingerprint scanners. The gelatin-based finger was successful in fooling all 11 devices tested. I wrote about spoofing fingerprints in 2016.

However, it’s the second problem with biometrics that is the really big one: once a person’s biometrics have been compromised, they will always be compromised. Since a person can’t change their fingerprint or whatever biometric is being relied upon, it’s ‘once owned, forever owned.’ That is biometrics’ major failing and the one that will be hardest to overcome.

Part of the reason is that it’s silly to only have 10 possible passwords your whole life (20, if you count toes) but unlike a password, once a biometric is compromised, it is permanent. Today, if your Twitter account gets hacked, you just change the password – but if you are using a biometric, you will be stuck with that hacked password for the rest of your life.

With the release of Windows 10, Microsoft stepped up its biometrics game. CNet reports that with the recent improvements in Windows 10 biometric security includes facial recognition software. Besides facial recognition, Windows Hello also supports other biometric factors to secure your PC. Some of the factors are fingerprints and iris recognition. For facial recognition though, Microsoft (MSFT) has partnered with chipmaker Intel (INTC) for its RealSense 3D camera tech to get the job done. RealSense uses depth-sensing infrared cameras to track the location and positions of objects. Microsoft uses RealSense to scan a person’s face or iris before unlocking the device in question.

To further push the biometrics agenda, more than 200 companies including Microsoft, Lenovo, Alibaba, and MasterCard have already come together to form a partnership known as the FIDO (Fast Identity Online) Alliance. FIDO was founded in 2013 to address issues such as a worldwide adoption of standards for authentication processes over the Web to help reduce reliance on passwords.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Open a New Galaxy Crack with a Pix

Open a New Galaxy Crack with a PixFollowers of the Bach Seat know biometrics have a limited value in replacing passwords. Despite the technical flaws another round of biometric hype is running across the intertubes. The latest round of biometric hype is coming from Samsung (005930). In the hope to revive their brand, they are on the verge of releasing the Galaxy S8. The Samsung Galaxy S8 includes the ability to use facial recognition software to unlock your brand new phone. CNet says that this idea “sounds awesome.”

Samsung Galaxy S8However, this awesome will lower the bar for your security. CNet reports that the video blogger MarcianoTech demonstrated a pre-release version of the Galaxy S8 is seen being unlocked using just a photo (at the 1:09 mark). To their credit Samsung has acknowledged that the Face Unlock feature is more for convenience than for security, and it cannot be used for mobile payments. Weak facial recognition software is a convenience for the user, it could also be very convenient for others, too.

The troubles with Face Unlock date back to 2011 when SlashGear reported that Google admitted the security system can be fooled by a picture of you and not the real thing. CNet reports that a Carnegie Mellon University spin-off in Pittsburgh, PittPatt, developed  that Face Unlock which was later acquired by Google (GOOG).

photographs are stored in facial recognition databasesJust to make Face Unlock and similar facial recognition systems more dangerous, the Guardian reports during recent testimony before congress the FBI admitted that they store about half of all adult Americans’ photographs in a facial recognition databases that can be accessed by the FBI. About 80% of photos in the FBI’s network are non-criminal entries, including driver’s licenses pictures from 18 states including Michigan (pdf) and passports.

The FBI first launched its advanced biometric database, Next Generation Identification, in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not tell the public about its newfound capabilities nor did it publish a privacy impact assessment, required by law, for five years.

Unlike with the collection of fingerprints and DNA, which is done following an arrest, photos of innocent civilians are being collected proactively. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos.States allowing FBI to search driver license pictures

 

I’m frankly appalled,” said Paul Mitchell, a congressman for Michigan. “I wasn’t informed when my driver’s license was renewed my photograph was going to be in a repository that could be searched by law enforcement across the country.” So anyone with a photo of you, or maybe even just access to your Facebook photos, could potentially access your phone.

rb-

There are two important reasons why biometrics don’t work, and why the old-fashioned password is still a better option: a person’s biometrics can’t be kept secret and they can’t be revoked.

There's no real way to conceal your eyes, face or fingerprints from the worldPeople expose their biometrics everywhere – they leave fingerprints behind at bars and restaurants, their faces and eyes are captured in photos and film, etc. There’s no real way to conceal your eyes, face, or fingerprints from the world. As far back as 2002, research led by Japanese cryptographer Tsutomu Matsumoto. Matsumoto and his team used clear gelatin to make artificial fingers that they then used to fool fingerprint scanners. The gelatin-based finger was successful in fooling all 11 devices tested. I wrote about spoofing fingerprints in 2016.

However, it’s the second problem with biometrics that is the really big one: once a person’s biometrics have been compromised, they will always be compromised. Since a person can’t change their fingerprint or whatever biometric is being relied upon, it’s ‘once owned, forever owned.’ That is biometrics’ major failing and the one that will be hardest to overcome.

Part of the reason is that it’s silly to only have 10 possible passwords your whole life (20, if you count toes) but unlike a password, once a biometric is compromised, it is permanent. Today, if your Twitter account gets hacked, you just change the password – but if you are using a biometric, you will be stuck with that hacked password for the rest of your life.

With the release of Windows 10, Microsoft (MSFT) stepped up their biometrics game. CNet reports that with the recent improvements in Windows 10 biometric security includes facial recognition software. Besides facial recognition, Windows Hello also supports fingerprint and iris recognition to secure your PC. For facial recognition though, Microsoft has partnered with chipmaker Intel (INTC) for its RealSense 3D camera tech to get the job done. RealSense uses depth-sensing infrared cameras to track the location and positions of objects, which Microsoft then uses to scan a person’s face or iris before unlocking the device in question.

To further push the biometrics agenda, more than 200 companies including Microsoft, Lenovo, Alibaba, and MasterCard have already come together to form a partnership known as the FIDO (Fast Identity Online) Alliance. Founded in 2013, FIDO was set up to address issues such as a worldwide adoption of standards for authentication processes over the Web to help reduce reliance on passwords.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Your Battery Healthy?

Li-ion batteries need very different care and feedingLithium-ion batteries have been in the news lately for causing fires and explosions. Explosions have happened with e-cigarettes, hoverboards, and the Samsung Galaxy Note 7, which was banned from all flights by the FAA due to its explosion risk. Despite the risks, most of today’s most popular gadgets have a battery.

Is Your Battery Healthy?Fred Langa at Windows Secrets Newsletter posted an article on how to get the most out of the lithium-ion (Li-ion) batteries. Li-ion batteries need very different care and feeding than the nickel-cadmium (Ni-Cd) and nickel-metal-hydride (Ni-MH) batteries used in earlier devices. Proper care of a Li-ion battery can result in as much as 15 times longer service life than with an improperly cared-for battery.

Steps to extend the battery service life

The article does not cover ways to get more run time between recharges; those techniques are already well-known. Most portable devices offer ample manual and automatic power-saving modes and methods such as adjusting screen brightness, slowing CPU speed, and reducing the number of apps running.

15 times longer service lifeRather, the article focused on ways to extend the battery’s overall service life. Follow these five important tips, and you’ll help make sure that your Li-ion batteries will deliver long, full, safe service lives in your new portable devices.

Keep your lithium batteries cool

Heat is the number-one enemy of Li-ion batteries. Heat issues can be caused by usage factors such as the speed and duration of battery charging and discharging. The physical environment also matters. Simply leaving your Li-ion powered device in the sun or in an enclosed car, even if the device isn’t being used, can significantly reduce the battery’s ability to take and hold a charge according to the article.

battery capacity can be reduced by 50%.Li-ion batteries perform best at about normal room temperature (68F/20C). If the device warms to 86F/30C, its ability to hold a charge drops by about 20%. Mr. Langa says if the battery is used at 113F/45C — a temperature easily reached by devices that are working hard or that are in the sun, battery capacity can be reduced by 50%.

So if your device or battery becomes noticeably warm while you’re using it, the article recommends moving to a cooler place. If that’s not possible, try reducing the amount of power the device is using by turning off unneeded apps, reducing screen brightness, or activating the device’s power-saving mode.

Of course, you can turn the device fully off until its temperature returns to normal. For fastest cooling, remove the battery, if possible Windows Secrets recommends. The battery and the device will cool off faster if they’re physically separated according to the article.

Low temperatures aren’t as much of a worry. Low temps usually won’t cause any long-term damage, although a cold battery won’t produce as much power as it otherwise would. The power drop becomes very noticeable at temperatures lower than about 40F/4C. Most consumer-grade Li-ion batteries are essentially useless at temperatures below freezing.

If your Li-ion powered device becomes excessively chilled for any reason, don’t try to use it. The article says to leave it powered off and move it to a warm place until the device is at normal temperature. Once the battery warms to a normal temperature, so will its electrical performance.

Unplug the charger

Overcharging, leaving a battery connected to a too-Unplug the chargerhigh voltage source for too long, can reduce a Li-ion battery’s ability to hold a charge, shorten its life, or kill it outright according to the author. Most consumer-grade Li-ion batteries are designed to work at around 3.6 volts per cell but will accept a temporary overvoltage of around 4.2 volts while charging. Mr. Langa warns that if a charger outputs the higher voltage for too long, internal battery damage can occur.

In severe cases, Windows Secrets warns that overcharging can lead to what battery engineers delicately refer to as “catastrophic failure.” Even in moderate instances, the excess heat produced by overcharging will negatively affect battery life, as you saw in Tip #1.

High-quality chargers can work in concert with circuitry inside well-designed Li-ion-powered devices and their batteries, reducing the danger of overcharging by properly tapering off the charging current. The article says the simplest, can’t fail method is not to leave your Li-ion devices connected to any charger longer than needed.

These properties are quite different from those of older Ni-Cd and Ni-MH battery technologies, which did best when left on their chargers for as long as possible. That’s because those older battery types have a high rate of self-discharge; that is, they start losing a significant amount of stored energy the moment you take them off the charger, even if the device they power is turned off.

In fact, a Ni-Cd battery can self-discharge at a rate of 10% in the first 24 hours. The self-discharge curve flattens after that, but a Ni-Cd battery will still lose an additional 10–20% charge per month. Ni-MH batteries are even worse. Their self-discharge rate is about 30% higher than that of Ni-Cd.

But Li-ion batteries have a very low rate of self-discharge. A healthy, full, lithium battery will self-discharge at about only 5% in the first 24 hours off the charger — with only 2% or so per month after that.

It’s simply not necessary to leave a Li-ion device on the charger until the last possible moment. For best results and the longest battery life, unplug the charger when it or the lithium-powered device shows a full charge.

It’s also not necessary to give new Li-ion devices an extended charge before first use. (Ni-Cd or Ni-MH devices used to come with warnings to do an initial charge of anywhere from 8 to 24 hours.) Li-ion batteries are fully ready for use when the charger or the device reads 100% charge. No extended charging is needed.

Don’t deep-discharge your battery

Not all discharge cycles exact the same toll on a battery. Long and heavy usage generates more heat, putting more stress on the battery; smaller, more frequent discharges extend the overall life of lithium batteries.

Don't deep-discharge your batteryYou might think that a higher number of small discharge/recharge cycles would eat into the battery’s overall lifespan. That was true with older technologies, the author says it’s not the case with Li-ion. Battery specs can be confusing because most manufacturers count a full Li-ion charge cycle as whatever it takes to add up to a 100% charge. For example, three 33% discharge/recharge cycles equal one full-charge cycle, five 20% cycles equal a full charge, and so on.

In short, a higher number of small discharge/recharge cycles doesn’t reduce a lithium battery’s total available full-charge cycles.

Again, heat and stress from heavy discharges cut battery life. So try to keep your deep-discharge events to a minimum. Mr. Langa recommends that you don’t let your device routinely run down to zero charge (where the device turns itself off). Instead, think of the bottom 15–20% of battery capacity as a reserve — for emergency use only. Get into the habit of swapping in a fresh battery (if possible) or plugging the device into external power well before the battery is empty.

Slow and steady is best

Slow and steady charge/discharge is bestAs you now know, both fast discharging and fast recharging generate excess heat and exact a toll on battery life. Windows Secrets says if you’ve run a device long and hard, let the battery cool to room temperature before recharging it. Batteries won’t accept a full charge when hot. And when recharging, make sure your charger doesn’t make the battery become hot to the touch, a hot battery is a sign the charger is pumping too much current, too fast, through the battery.

Overcharging is more likely with chargers that are cheap, off-brand models; that use fast-charge circuitry; or that are wireless (inductive). These “dumb” chargers simply pump out current, accepting little or no feedback from the device being charged. Overheating and overvoltages can easily occur, damaging or even destroying the battery.

Fast chargers provide a useful charge to a drained battery in minutes and not hours. The author explains there are various approaches to fast-charging technology, and not all of them are compatible with all lithium batteries. Unless the charger and the lithium battery are specifically designed to work together, fast charging could cause overheating and overvoltages. Generally, it’s best not to use one brand of fast charger on a different brand’s device.

Wireless (inductive) chargers use a special charging mat or surface to restore a battery’s power. It sounds wonderfully convenient, but inductive charging always generates excess heat, even when it’s working normally.

Not only is the excessive heat produced by a wireless charger not good for lithium batteries, it also wastes energy. By its nature, inductive charging’s efficiency is always going to be lower than a standard charger’s. Mr. Lunga says that higher heat and less efficiency easily outweigh convenience.

In any case, the safest approach is to use only chargers sold by the OEM of your lithium-powered device. It’s the only way to be sure that the charger will keep temperatures and voltages within specs. The article recommends that if a OEM charger isn’t available, use a low-output charger that’s unlikely to pump damaging amounts of power into the device you’re charging.

One source of low-output, non-OEM charging that’s often available is the USB port on a standard PC. A typical USB 2.0 port provides 500mA (.5 amps) per port; USB 3.0 provides up to 900mA (.9 amps) per port. In contrast, some dedicated chargers will output 3,000-4,000mA (3-4 amps). The low amperage offered by USB ports will usually provide cool, safe charging of almost any Li-ion device.

If possible, carry a spare battery

carry a spare batteryIf your device allows for easy battery replacement, carrying a spare battery is cheap insurance. It will give you twice the run time. When the in-use battery approaches 15–20% charge, simply swap out the drained battery for a fresh, cool one — you get instant full power, with no heat worries.

A spare battery also allows for other benefits. For example, if you find yourself in a situation where the installed battery is running hot, you can swap out the hot battery to let it cool. Having two batteries should also eliminate any need to use fast chargers — you can charge the spare at a safe, slow rate while the other is in use.

rb-

For more tips on how to keep your Apple iPhone battery in tip-top shape, check out this post from 2014.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Bad Passwords Crippled the Web

Bad Passwords Crippled the WebFollowers of the Bach Seat know that passwords suck and now default passwords really suck. In fact, default passwords seem to be a key part of the massive DDOS attack that disabled large parts of the Internet on October 21, 2016. The cyberattack targeted Internet traffic company DYN. DYN provides DNS services for many high-profile sites. Some of the sites affected by the attack on Dyn included; Amazon (AMZN), Business Insider, New York Times, Reddit, and Twitter (TWTR).

Security researcher Brian Krebs, whose site, krebsonsecurity.com, was one of the first sites hit by a massive 620 GB/s DDoS attack, has reported the Mirai botnet was at the center of the attack on his site. CIO.com reports  ‘Mirai’ can break into a wide range of Internet of Things (IoT) devices from CCTV cameras to DVRs to home networking equipment turning them into ‘bots. CIO reports a single Chinese vendor, Hangzhou Xiongmai Technology made many of the devices used in the Mirai attacks.

Level 3 Communications says there are nearly half a million Mirai-powered bots worldwide. To amass an IoT botnet, a Mirai bot herder scans a broad range of IP addresses, trying to login to devices using a list of default usernames and passwords that are baked into Mirai code, according to US-CERT. The Mirai zombie devices are largely security cameras, DVRs, and home routers. Mr. Krebs identified some of the specific devices.

Mirai Passwords

UsernamePasswordFunction
admin123456
root123456ACTi IP camera
adminpassword
admin1password
rootpassword
admin12345
root12345
guest12345
admin1234
root1234
administrator1234
888888888888
666666666666Dahua IP camera
admin(none)
admin1111Xerox printers, etc.
admin1111111Samsung IP camera
admin54321
admin7ujMko0adminDahua IP camera
adminadmin
adminadmin1234
adminmeinsmMobotix network camera
adminpass
adminsmcadminSMC router
Administratoradmin
guestguest
motherfucker
root(none)Viviotek IP camera
root00000000Panasonic printers
root1111
root54321Packet8 VoIP phone
root666666Dahua DVR
root7ujMko0adminDahua IP camera
root7ujMko0vizxvDahua IP camera
root888888Dahua DVR
rootadminIPX-DDK network camera
rootankoAnko Products DVR
rootdefault
rootdreamboxDreambox TV receiver
roothi3518HiSilicon IP Camera
rootikwbToshiba network camera
rootjuantechGuangzhou Juan Optical
rootjvbzdHiSilicon IP Camera
rootklv123HiSilicon IP Camera
rootklv1234HiSilicon IP Camera
rootpass
rootrealtekRealtek router
rootroot
rootsystemIQinVision camera, etc.
rootuser
rootvizxvDahua camera
rootxc3511H.264 - Chinese DVR
rootxmhdipcSenzhen Anran security camera
rootzlxx.EV ZLX two way speaker
rootZte521ZTE router
serviceservice
supervisorsupervisorVideoIQ
supportsupport
techtech
ubntubntUbiquiti AirOS Router
useruser

US-CERT says the purported author of Mirai claims to have 380,000 IoT devices are under its control. Some estimate the botnet has generated greater than 1Tbps DDoS attacks.

DDOS attackWhen Mirai botnets are called upon to carry out DDoS attacks, they can draw on a range of tools including ACK, DNS, GRE, SYN, UDP and Simple Text Oriented Message Protocol (STOMP) floods, says Josh Shaul, vice president of web security for Akamai.

rb-

Followers of Bach Seat already know that many of the default passwords used by Mirai are among the worst and should have been changed already. They include:

  • Password
  • 123456
  • 12345
  • 1234

While reports say, Chinese vendor, XiongMai Technologies equipment was widely exploited, other notable tech firms are included. The Mirai zombie army includes equipment from Xerox (XRX), Toshiba (TOSBF), Samsung (005930), Panasonic (6752), and ZTE (763).

I wrote about security cameras being compromised as part of botnets back in July here.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.