DSLR Camera |
Ransomware and malware attack has become a major threat to computer systems recently. But now, security researchers have discovered that another device that might be at risk that is a DSLR camera.
Check Point Software Technologies reveil in a detailed report that how its security researchers were able to remotely install malware on a digital DSLR camera.
Researcher Eyal Itkin found that a hacker can easily plant malware on a digital camera. According to him, the standardized Picture Transfer Protocol is an ideal method for delivering malware. it’s unauthenticated, and it can be used with both Wi-Fi and USB. He also notes that cameras could be a particularly juicy target for hackers.
Once the camera is attacked, the photos could end up being held hostage until the user pays the ransom for them to be released.
The report also notes that individual with an infected Wi-Fi access point could deploy it at a tourist destination to pull off an attack, or infect a user’s PC also.
Other camera makers including Nikon, Sony, Canon and others have not released any statements regarding the flaw. But, the researchers believe camera models from other vendors may also include similar vulnerabilities. This means that other camera makers may have used the same protocol for their camera models.
Check Point recommends to avoid attacks, camera owners should make sure that they are using the latest firmware version, and install the patch if available. And they should also turn off the camera’s Wi-Fi when not in use.
Source
1 Comments
Well information!
ReplyDeletePlease do not enter any spam link within the comment box.