Secplicity Blog
Cybersecurity Headlines & Trends Explained
Once Stolen, What Do Hackers Do With Your Data?

It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview…
Responsible Disclosure: Ouvis C2 HD Security Camera

As a part of our ongoing IoT vulnerability research project, one of the recently tested devices included the Ouvis C2 HD Wireless Security Camera. This is a wireless camera which includes Android, iOS and browser-based remote viewing. Open Telnet Access Vulnerability After connecting an IoT device…
WatchGuard's Q4 2016 Internet Security Report

Today, I am very excited to share WatchGuard's first formal Internet Security Report. For over a decade, WatchGuard's threat team has educated the general public and our customers about the latest threats, vulnerabilities, and security stories through articles, podcasts, and videos. In this new…
Responsible Disclosure: Amcrest View Web Portal

Recently I purchased a number or IoT devices for a vulnerability research project. Among them was the Amcrest IPM-721S Wireless IP camera, a wireless pan-and-tilt camera, which at the time had 6,381 reviews on Amazon.com (interestingly, that number is down to 1,425 at the time of this writing)…
What is the TCP Split-Handshake Attack and Does It Affect Me?

If you've followed security news over the past few days, you've probably seen a lot of hoopla about a TCP split-handshake vulnerability that can affect firewalls and other networking and security devices. Many of the Media's articles characterize this complicated TCP connection attack as, "a hacker…
Understanding IPv4 Subnetting (Part 2)
