{"id":4159,"date":"2016-12-07T11:15:15","date_gmt":"2016-12-07T16:15:15","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=4159"},"modified":"2016-12-07T11:15:15","modified_gmt":"2016-12-07T16:15:15","slug":"backdoor-accounts-found-in-80-sony-ip-security-camera-models","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/12\/07\/backdoor-accounts-found-in-80-sony-ip-security-camera-models\/","title":{"rendered":"Backdoor accounts found in 80 Sony IP security camera models"},"content":{"rendered":"<p><a href=\"http:\/\/www.pcworld.com\/article\/3147311\/security\/backdoor-accounts-found-in-80-sony-ip-security-camera-models.html\">http:\/\/www.pcworld.com\/article\/3147311\/security\/backdoor-accounts-found-in-80-sony-ip-security-camera-models.html<\/a><\/p>\n<p>Network security cameras that were created by Sony could have been compromised with botnet malware if their firmware is not updated to the latest version. \u00a0This was detected by SEC Consult, they found two backdoor accounts that existed in 80 models of professional Sony security cameras. \u00a0Some of these devices were used at government agencies. \u00a0Sony was notified about the vulnerability in October and released firmware updates for all the affected camera models on November 28th.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.pcworld.com\/article\/3147311\/security\/backdoor-accounts-found-in-80-sony-ip-security-camera-models.html Network security cameras that were created by Sony could have been compromised with botnet malware if their firmware is not updated to the latest version. \u00a0This was detected by SEC Consult, they found two backdoor accounts that existed in 80 models of professional Sony security cameras. \u00a0Some of these devices were used at government [&hellip;]<\/p>\n","protected":false},"author":12707,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717573],"tags":[],"class_list":{"0":"post-4159","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-13-disaster-recovery-business-continuity","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/4159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/12707"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=4159"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/4159\/revisions"}],"predecessor-version":[{"id":4160,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/4159\/revisions\/4160"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=4159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=4159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=4159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}