Security Cameras a Top Target of Cyber Attacks - How to Secure your Systems

This week, Kaspersky Lab's identified DVRs and IP camera systems as the top source of Internet attacks. More than 63% of the attacks observed by Kaspersky came from DVR and IP camera systems, and nearly 20% came from routers and other networking devices. Essentially, hackers are taking over IP camera systems and using them to attack other systems. You might not care your system is being used to attack some business, but it also means the hackers could view, record and transmit your personal home/business audio & video streams. There's even a creepy website streaming from over 100,000 private security cameras! If you're able to check your cameras from outside your home or business, the system is vulnerable. It’s alarmingly easy for an IP camera to be hacked so make sure to take the below precautions as your Businesses' or family's privacy could be at risk.

Update your Camera's Firmware - Most modern IP security cameras feature user upgradeable firmware. If a security vulnerability is found, the IP security camera manufacturer will often fix the vulnerability by issuing a firmware update. Usually, you can update your camera's firmware from the admin console via a web browser. Be sure to frequently check for updates!

Password Protect Your Cameras - Most cameras offer some form of basic authentication. Protect your camera feeds with a username and a strong password and change it periodically.

Rename the Default Admin Account & Set a New Admin Password - Your camera's default admin name and password, set by the manufacturer, is usually available by visiting their website and going to the support section for your camera model. If you haven't changed the admin name and password then even the most novice hacker can quickly look up the default password and view your feeds and/or take control of your camera.

If Your Camera is Wireless, Turn on WPA2 Encryption - If your camera is wireless capable, you should only join it to a WPA2-encrypted wireless network so that wireless eavesdroppers can't connect to it and access your video feeds.

Avoid Port Forwarding to your IP Camera - The router you use comes with built in security that blocks certain applications from accessing your home network. Some people choose to set up port forwarding for devices such as an XBox which might be OK, but when it comes to IP cameras I don’t recommend you do this. If you’re not sure what I’m talking about you’re probably safe (you have to actively open port forwarding so you will know if you have done that).

 

May 2017 CERT Cyber Vulnerabilities

Each month, Nebula Consulting posts vulnerability notes from CERT's vulnerability database. Check back often for updates! 02 May 2017 - VU#491375 - Intel Active Management Technology (AMT) does not properly enforce access control

Technologies based on Intel Active Management Technology may be vulnerable to remote privilege escalation, which may allow a remote, unauthenticated attacker to execute arbitrary code on the system.

A remote, unauthenticated attacker may be able to gain access to the remote management features of the system. The execution occurs at a hardware system level regardless of operating system environment and configuration.

Solution: https://downloadcenter.intel.com/download/26754

04 May 2017 - VU#276408Intel Active Management Technology (AMT) does not properly enforce access control

Think Mutual Bank mobile banking app for iOS, version 3.1.5 and earlier, fails to properly validate SSL certificates provided by HTTPS connections, which may enable an attacker to conduct man-in-the-middle (MITM) attacks.

An attacker on the same network as the iOS device may be able to view or modify network traffic that should have been protected by HTTPS, which may lead to the exposure of sensitive account information, including login credentials.

Solution: The vendor has released version 3.2.0 to address this issue. Users are encouraged to update to the latest release.

04 May 2017 - VU#556600Space Coast Credit Union SCCU Mobile for Android and iPhone fails to properly validate SSL certificates

Space Coast Credit Union SCCU Mobile for Android, version 2.1.0.1104 and earlier, and for iOS, version 2.2 and earlier, fails to properly validate SSL certificates provided by HTTPS connections, which may enable an attacker to conduct man-in-the-middle (MITM) attacks.

An attacker on the same network as the Android or iOS device may be able to view or modify network traffic that should have been protected by HTTPS, which may lead to the exposure of sensitive account information, including login credentials.

Solution: NONE. The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workarounds.

5 Advantages of Structured Cabling That Make Your Life Better

Did you Nebula Consulting installs voice, data & video cabling systems? Over 50% of network issues are caused by cabling issues. New, structured cabling increases network speeds by up to 10x, supplies power to equipment, supports future upgrades & reduces install time. All our cabling is installed by a licensed electrician. By nature a structured cabling system is more neat and organized than the traditional point-to-point cabling systems. A structured cabling system does take planning, but after you have it set, you can rest easy. The advantages include –

    • Supports future upgrades – the modular design make moves, adds and changes a snap!
    • Reduces install time – by allowing for efficient changes and upgrades
    • Reduces cabling bulk and congestion – an organized and planned infrastructure allows for the use of smaller diameter trunk cabling and cleaner cable management
    • Improves airflow – reduced congestion decreases the chances for blocked airflow and crushed cables
  • Reduces power and cooling usage and cost

How to Stay Safe as an Online Merchant

If you’re selling products online – whether that’s on social media, through a marketplace or your own store – get to know the basic behaviors of eCommerce safety: monitoring, updating and revising. Here are some strategies to help you stay safe as a seller and protect your customers. Invest in a Secure Web Environment

The platform you use will have a big impact on your web security; make sure you go for a sophisticated one with a proven security track record. Once you decide on a solution, don’t just settle for its default security settings — customize it with plugins, packages and/or tools that enhance your security wherever possible.

Put up Firewalls and Security Layers

Short of buying more bandwidth, firewalls are your best bet when it comes to preventing denial of service or distributed denial of service attacks (DDoS: where hackers attempt to flood your system and crash your site). Penetration testing can help unearth any issues.

Update Frequently

Staying on top of web updates is key — they will keep your store safe and functioning correctly. Update your SSL certificates — they expire and need regular updating.

Get Clued up on Payment Security

Storing people’s credit card and payment details is one of your most important jobs as an online merchant. Use adequate encryption and SSL certificates. Always verify card and address details to reduce the risk of fraudulent transactions. Geo-targeting can also help eliminate these transactions.

Manage your data safely

Storing customer data is a big responsibility — don’t take it lightly and don’t mess with the trust they have placed in you. Purge customer data frequently and don’t store any more data than you have to. Consider integrating with mobile payments for customer convenience and improved security.

Backups, Backups, Backups!

Backups will save your life if something goes wrong — so make sure that you test them regularly (and that they actually work). You need to test your backup system and ensure that you can actually restore your site and data from it.

Source: Patrick Foster

The Essential Cybersecurity Guide to Protecting Your Business

Two-thirds of large businesses have experienced a data breach in the last year, and nearly half of small and midsized businesses (SMBs) have been the victim of a cyber attack. With the increase in cyber breaches, the National Institute of Standards and Technology established a framework in 2013 for reducing risks to the nation’s critical infrastructure. The framework takes a “best practice” approach to analyzing and mitigating risks and recommends five steps that any sized company can take for addressing cyber threats.The five steps are:

  • Identify: Inventory your most valuable assets, the “crown jewels” that are of greatest importance to your business and would be most valuable to criminals, such as employee, customer and payment data.
  • Protect: Assess what protective measures you need to have in place to be as defended as possible against a cyber incident.
  • Detect: Have systems in place that would alert you if an incident occurs, including the ability for employees to report problems.
  • Respond: Make and practice an incidence response plan to contain an attack and maintain business operations in the short-term.
  • Recover: Know what to do to return to normal business operations after an incident or breach, including assessing any legal obligations.

On a day-to-day basis, businesses can improve their online safety practices by following these four tips:

1. Keep a clean machine Having the latest security software, web browser and operating system in your business are the best defenses against viruses, malware and other online threats.

2. Protect information Secure accounts by adding two-factor authentication and making passwords long, strong and unique.

3. Protect the company’s online reputation Set security and privacy settings to your comfort level of sharing.

4. Educate employees Teach your employees basic best practices. For example, if an email, social network post or text message looks suspicious—even if you know the source—delete it.

Many SMBs are increasingly vulnerable to cyber attacks. All businesses should focus on creating a culture of cybersecurity and keep protecting the company top of mind for employees.

Source: NCSA