<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: $55 surveillance camera hacked by Mirai botnet within 98 seconds</title>
	<atom:link href="http://www.epanorama.net/blog/2016/11/23/55-surveillance-camera-hacked-by-mirai-botnet-within-98-seconds/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/11/23/55-surveillance-camera-hacked-by-mirai-botnet-within-98-seconds/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 15:51:35 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/11/23/55-surveillance-camera-hacked-by-mirai-botnet-within-98-seconds/comment-page-1/#comment-1551522</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 17 Jun 2017 17:56:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=49610#comment-1551522</guid>
		<description><![CDATA[Firm Responsible For Mirai-Infected Webcams Hires Software Firm To Make Its Products More Secure 
https://it.slashdot.org/story/17/06/16/2151221/firm-responsible-for-mirai-infected-webcams-hires-software-firm-to-make-its-products-more-secure

After seeding the globe with hackable DVRs and webcams, Zhejiang Dahua Technology Co., Ltd. of Hangzhou, China will be working with the U.S. firm Synopsys to &quot;enhance the security of its Internet of Things (IoT) devices and solutions.&quot; Dahua, based in Hangzhou, China said it will with Mountain View based Synopsys to &quot;enhance the security of its Internet of Things (IoT) devices and solutions.&quot; In a joint statement, the companies said Dahua will be adopting secure &quot;software development life cycle (SDLC) and supply chain&quot; practices using Synopsys technologies in an effort to reduce the number of &quot;vulnerabilities that can jeopardize our products,&quot; 

Firm That Made Mirai-Infected Webcams Gets Security Religion
https://securityledger.com/2017/06/firm-that-made-mirai-infected-webcams-gets-security-religion/

In-brief: After seeding the globe with hackable DVRs and webcams, Zhejiang Dahua Technology Co., Ltd. of Hangzhou, China will be working with the U.S. firm Synopsys to “enhance the security of its Internet of Things (IoT) devices and solutions.”

The surveillance camera maker whose name became synonymous with insecure, connected devices after its cameras formed the backbone of the Mirai botnet has hired a top secure software development and testing firm to makes its products less prone to hacking.

Dahua’s cameras and digital video recorders (DVRs) figured prominently in the Mirai botnet, which launched massive denial of service attacks against websites in Europe and the U.S., including the French web hosting firm OVH, security news site Krebsonsecurity.com and the New Hampshire based managed DNS provider Dyn. Cybercriminals behind the botnet apparently exploited an overflow vulnerability in the web interface for cameras and DVRs to gain access to the underlying Linux operating system and install the Mirai software, according to research by the firm Level3.]]></description>
		<content:encoded><![CDATA[<p>Firm Responsible For Mirai-Infected Webcams Hires Software Firm To Make Its Products More Secure<br />
<a href="https://it.slashdot.org/story/17/06/16/2151221/firm-responsible-for-mirai-infected-webcams-hires-software-firm-to-make-its-products-more-secure" rel="nofollow">https://it.slashdot.org/story/17/06/16/2151221/firm-responsible-for-mirai-infected-webcams-hires-software-firm-to-make-its-products-more-secure</a></p>
<p>After seeding the globe with hackable DVRs and webcams, Zhejiang Dahua Technology Co., Ltd. of Hangzhou, China will be working with the U.S. firm Synopsys to &#8220;enhance the security of its Internet of Things (IoT) devices and solutions.&#8221; Dahua, based in Hangzhou, China said it will with Mountain View based Synopsys to &#8220;enhance the security of its Internet of Things (IoT) devices and solutions.&#8221; In a joint statement, the companies said Dahua will be adopting secure &#8220;software development life cycle (SDLC) and supply chain&#8221; practices using Synopsys technologies in an effort to reduce the number of &#8220;vulnerabilities that can jeopardize our products,&#8221; </p>
<p>Firm That Made Mirai-Infected Webcams Gets Security Religion<br />
<a href="https://securityledger.com/2017/06/firm-that-made-mirai-infected-webcams-gets-security-religion/" rel="nofollow">https://securityledger.com/2017/06/firm-that-made-mirai-infected-webcams-gets-security-religion/</a></p>
<p>In-brief: After seeding the globe with hackable DVRs and webcams, Zhejiang Dahua Technology Co., Ltd. of Hangzhou, China will be working with the U.S. firm Synopsys to “enhance the security of its Internet of Things (IoT) devices and solutions.”</p>
<p>The surveillance camera maker whose name became synonymous with insecure, connected devices after its cameras formed the backbone of the Mirai botnet has hired a top secure software development and testing firm to makes its products less prone to hacking.</p>
<p>Dahua’s cameras and digital video recorders (DVRs) figured prominently in the Mirai botnet, which launched massive denial of service attacks against websites in Europe and the U.S., including the French web hosting firm OVH, security news site Krebsonsecurity.com and the New Hampshire based managed DNS provider Dyn. Cybercriminals behind the botnet apparently exploited an overflow vulnerability in the web interface for cameras and DVRs to gain access to the underlying Linux operating system and install the Mirai software, according to research by the firm Level3.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/11/23/55-surveillance-camera-hacked-by-mirai-botnet-within-98-seconds/comment-page-1/#comment-1525349</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 23 Nov 2016 08:21:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=49610#comment-1525349</guid>
		<description><![CDATA[More information on Mirai botnet can be found at 
http://www.epanorama.net/newepa/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/]]></description>
		<content:encoded><![CDATA[<p>More information on Mirai botnet can be found at<br />
<a href="http://www.epanorama.net/newepa/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/" rel="nofollow">http://www.epanorama.net/newepa/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
