Also, NAT is a zero-security solution. Get a router with a firewall or assume you are going to be hacked.
Beyond that, any device on the network that is compromised can be used to connect to other devices on the network. The assumption that one can be careless because a device will be in a safe space is not a valid approach to security.
bdragule, I worked in a children’s psychiatric facility for a few years. I realize you were advised to do so, but personally, I wouldn’t violate a child’s privacy that way. I get that you were protecting them, but for me, that feels like a lack of trust. We had cameras in the facility, but only in public areas, and in outside areas. No bedrooms, bathrooms, locker rooms, etc. But again, you were following advice and that is the right way to do it.
Protects your system and applications from external attacks and eliminates vulnerabilities. This is accomplished by detecting and preventing network attacks from known, unknown, and zero day exploits that infect other networks throughout the world.
Infected Device Quarantine:
Prevents infected devices from sending sensitive information or security threats to clients outside your network. Also, protects your internal network from being further infected while you get the infected system cleaned.
Records the devices that have been successfully protected by the Antivirus software as well the source and classification of the attack.
I’m skeptical because it was initially provided for a few years free w/router purchase (thereafter pay) then they changed course, tossed it in gratis ‘forever’…
Agreed – I don’t think it was a matter of “have to.” The problem does not describe saving vital information to SD instead of inside the cam. The description reads to me that the information was being written out to log files along with other information the camera wanted to log. This would probably have been done in error, not as a necessary feature.
I’m no expert in the specifics of how firewalls are implemented on all brands of routers. But, intrusion detection and antivirus are features that go above and beyond a mere firewall. Certainly not a bad thing.
In fact, when a software/firmware vulnerability is discovered “internally”, companies first correct it, then deploy the security patch, and only then they make it public. Because if they first make the vulnerability public, now hackers are aware of it and can exploit it, and you can not do anything about it, because there is no fix.
This is what Microsoft does, for example, when they or a specialized company discovers a vulnerability on Windows.
To be clear, you are still protected by your router. I’ve never heard of a home modem/router that doesn’t use NAT by default.
So if you’ve never put a MiniSD card in your V1, as I read the threat report, you are completely safe.
If you have and activated the SD card issue then anyone who gains access to your local network and is malicious will be able to access that camera [a sophisticated attacker would probably be able to access the live feed]. They first have to get access your local network, either using (a) a flaw in the router/modem or (b) a flaw or exploit in some other device on your network or (c) actually hacking the wifi network locally (or you give them access).
Placing your V1 on it’s own subnet would be one way to increase your security but I would rate this threat pretty low because if a hacker has local access to your network you’re already in big trouble.
Yea and if this was any reasonable scale of time, I would agree. They could have fixed it first before disclosing, and I prefer that (obviously). But there must come a time, where a known vulnerability needs to be disclosed. One option they had would be to disable SD cards on v1 cameras until they fixed it. Maybe unpopular, but not as unpopular as potentially leaking data. Every company has different policies on grace periods for vulnerabilities, but saying that it could go three years being “a priority” seems absurd.
Please look at the details of the “security flaw” and see if it could have in any way impacted you. Unless you gave your personal wifi userid and password out to strangers and fiddled with your router ports, it probably could not have possibly impacted you. That doesn’t make what they did right, but knowing the details of what the real risk was puts the risk in perspective. Just sayin’.