Secplicity Blog
Cybersecurity Headlines & Trends Explained
Once Stolen, What Do Hackers Do With Your Data?
It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview…
Responsible Disclosure: Ouvis C2 HD Security Camera
As a part of our ongoing IoT vulnerability research project, one of the recently tested devices included the Ouvis C2 HD Wireless Security Camera. This is a wireless camera which includes Android, iOS and browser-based remote viewing. Open Telnet Access Vulnerability After connecting an IoT device…
WatchGuard's Q4 2016 Internet Security Report
Today, I am very excited to share WatchGuard's first formal Internet Security Report. For over a decade, WatchGuard's threat team has educated the general public and our customers about the latest threats, vulnerabilities, and security stories through articles, podcasts, and videos. In this new…
Responsible Disclosure: Amcrest View Web Portal
Recently I purchased a number or IoT devices for a vulnerability research project. Among them was the Amcrest IPM-721S Wireless IP camera, a wireless pan-and-tilt camera, which at the time had 6,381 reviews on Amazon.com (interestingly, that number is down to 1,425 at the time of this writing)…
What is the TCP Split-Handshake Attack and Does It Affect Me?
If you've followed security news over the past few days, you've probably seen a lot of hoopla about a TCP split-handshake vulnerability that can affect firewalls and other networking and security devices. Many of the Media's articles characterize this complicated TCP connection attack as, "a hacker…