NW-Bound
Give me a museum and I'll fill it. (Picasso) Give me a forum ...
- Joined
- Jul 3, 2008
- Messages
- 35,712
I looked and it's the same story as I saw and reported earlier. Would not be fun for the hackers if they could not also hack the inside room monitor video camera. Not something I would want to watch but these guys are sick.This example is only about collecting data, but I think a hacker could have fun with gaining control of the connected device too.
Vibrator Maker To Pay Millions Over Claims It Secretly Tracked Use : The Two-Way : NPR
Not an expert in this, but even if the device they break in has limited function, then theoretically they can use it as a bridge to gain access to other stuff.
Example: I have two WiFi cameras for rat surveillance up in the attic. I set them up to store the recorded video into my file server using FTP. Can hackers use the same path not to write, but to read other files I have on the server?