Internet Attacks Are On the Rise, Network Cameras Are Not Spared

Security experts predict that so-called Google hacking will increase significantly this year, and even network cameras may fall victim.

Google hacking refers to malicious internet users or worms using search engines to locate information resources that were unintentionally made public online.

CyberTrust warns that all internet-connected devices—including network cameras—should be considered potential security threats.

Last year, two of the most notorious viruses used Google and other search engines to identify possible attack targets: the MyDoom variant in August used Google to find email addresses, while the Santy worm a few months later used multiple search engines to locate websites with specific software vulnerabilities. Security experts expect to see more such incidents this year and suggest that businesses take steps to reduce their risk of being attacked.

CyberTrust's Asia-Pacific security manager, Andrew Collins, advises that to prevent indexing by search engines, internet resources like network cameras must be secured. (Our product manager Kenny notes: Network cameras should be set up using virtual/private IP settings, and to allow internet users to view the cameras, install our video broadcasting system, so Google can't find them.)

Collins said, "We expect to see more automated attacks using Google to select potential targets. These attacks use search strings to find unintentionally exposed information, such as erroneous code, network cameras, confidential documents, and web pages. Devices with networking capabilities, such as network cameras and digital image capturing systems, should be moved to a private network with non-discoverable IP addresses."

Gartner analyst Jay Heiser also pointed out in a recent potential risk advisory that network cameras with preset network addresses can be easily discovered through Google hacking, posing potential dangers.

Heiser said that while some network cameras are intentionally made available for viewing, many are not. Ensuring they have the latest patches and strong passwords is essential. He added that unpatched network cameras may be susceptible to hackers taking control over their settings and behaviors.

Heiser further explained that most search engines look for a file named "robots.txt," which indicates which parts of a website can be indexed.

For non-public systems and components supporting public systems, using "robots.txt" and other techniques to prevent indexing is the best approach. All internet-connected devices—even network cameras—must be treated as security-sensitive.

CyberTrust's Collins noted that businesses that treat security as an integrated system rather than considering individual applications and devices will find fewer vulnerabilities that attackers can exploit.


Wi-Fi Network Planning Advice

Answers & Suggestions

15 Tips for Hard Drive Longevity

Answers & Suggestions

10 Things About Image Analysis

Answers & Suggestions

知識學院

蘊藏許多助人的知識與智慧。

關注知識學院

By clicking "Accept All", you agree to our use of cookies to enhance your website experience, analyze performance, and deliver relevant marketing content. For more details, see our Privacy Policy. You can also manage your cookie preferences.

×

Privacy Policy

Welcome to our website. To help you use our services with confidence, we explain our privacy policy below to safeguard your rights. Please read the following information carefully:

  • Scope of the Privacy Policy: This privacy policy applies to all personal data collected by this website, including how we collect, process, and use such data when you use our services. This policy does not apply to other linked websites or personnel not managed by this website.
  • Collection, Processing, and Use of Personal Data: When you visit our website or use our services, we may ask for necessary personal information, which will be processed and used only for specified purposes. Without your written consent, we will not use your personal data for other purposes.
  • Data Protection: We adopt multiple security measures to protect your personal data, including firewalls and antivirus systems. Only authorized personnel can access your data, and they must sign confidentiality agreements. When we outsource services, we require that they comply with confidentiality obligations and ensure data security.
  • External Links: Our web pages may contain links to external websites. These linked websites do not fall under our privacy policy, and you should refer to their respective privacy policies.
  • Sharing Personal Data with Third Parties: We do not provide, exchange, rent, or sell your personal data to third parties, except as required by law or contractual obligations. We may share your data under the following circumstances:
    • With your written consent.
    • As required by law.
    • To protect your life, body, freedom, or property from danger.
    • For statistical or academic research with public institutions or academic research organizations, ensuring data is anonymized.
    • When your actions on the website violate the terms of service, necessitating identification, contact, or legal action.
  • Use of Cookies: To provide you with the best service experience, we use cookies on your device. If you do not wish to accept cookies, you can increase the privacy level in your browser settings to refuse cookies. This may, however, affect the availability of certain features.
  • Privacy Policy Revisions: We may revise the privacy policy as needed, and any changes will be published on this website to ensure you are informed of how we handle your personal data.