Eagle Eye Networks

Category: Cybersecurity

Cyber blog - Reaper-FI

Latest Threat: Reaper

Last year Mirai malware hit 500,000 IoT devices and launched DDoS attacks. Now, a new malware has been identified by researchers at CheckPoint that is surpassing Mirai by hitting millions of IoT devices worldwide. On October 19, 2017, Checkpoint, announced that they’ve been tracking a “massive” IoT botnet “forming to

Read More »
The-4-Cyber-Security-risks-for-Video-Monitoring-Centers-rsz

The 4 Cyber Security Risks for Video Monitoring Centers

Video Monitoring Centers are taking unnecessary cyber security risks daily just by working with video surveillance providers that are not cyber secure. But just because the video surveillance market stays behind the times on cyber security, does it mean the Video Monitoring Centers should, too? Read further to understand the

Read More »
equifax-breach

Most Severe Breach

Equifax, the credit reporting company, just experienced the most severe data breach in history. This breach exposed sensitive information, including Social Security numbers and addresses, of up to 143 million Americans. This is the most severe breach in history because for the first time it includes birthdates, Social Security numbers,

Read More »
devils-ivy-update-fi

Devil’s Ivy Update

In July 2017, cyber security researchers discovered a serious flaw, which they named “Devil’s Ivy”, that exists in nearly all cameras supporting the popular ONVIF specification. The flaw allows hackers to take full control of ONVIF-compliant cameras. Most camera makes and models are vulnerable, including top brand high-quality cameras. Within

Read More »
devils-ivy-c

Devil’s Ivy Likely Widespread

A recently discovered vulnerability labeled “Devil’s Ivy” is expected to impact millions of cameras that support the ONVIF protocol. The initial exploit was discovered on an Axis Camera and then found on 249 different Axis camera models – but the problem goes well beyond Axis Cameras.  The code vulnerability is in

Read More »
Beware Of Cloud Imposters

Beware of Cloud Imposters

We recently had a discussion with a customer regarding the cyber security of their “fake cloud” provider for access control. They had been sold a bill of goods for an access control system that was supposed to be cloud-based. It turned out that it was not really cloud-based at all.

Read More »
petya-FI

A Victim of the Recent Petya Ransomware Virus

One of Brivo’s large international customers (who shall go nameless due to confidentiality) was a victim of the recent Petya Ransomware virus. The virus infected a large number of their Windows machines, and in particular, their Windows machines operating their access control system. Unfortunately, many of their offices around the world were

Read More »
ransomeware-fi

WannaCry Ransomware

Unfortunately, hackers are always coming up with new ways to make money and exploit systems. Cyber is no different. The WannaCry ransomware breaks new ground in its reach, use of bitcoin, and success. About this Ransomware This ransomware attack on windows-based systems has been brutal for lot of people. It locks

Read More »
Vulnerabilities-WIFI-Cameras-FI

Vulnerabilities in WiFi Cameras

Inexpensive WiFi cameras are widely available over the internet. That might sound compelling, but it’s important to understand their security holes and the risk they bring to your network. Pierre Kim, an IT security blogger, has recently discovered 1,250 different camera models that are modified and branded by hundreds of

Read More »

Cloudflare Security Bug

Eagle Eye Networks does not use Cloudflare – a website performance enhancement service. There was a relatively severe security issue detected by Tavis Ormandy at Project Zero in the Cloudflare service. He found that certain private information could be extracted under some rare circumstances. It’s a severe security issue, but it’s

Read More »