On 22/03/2013 10:54 a.m., David Robinson wrote:
Well malware writers will look at this and start to exploit it. When that scales up with hosting malware, C&C, launching DDoS, etc the manufacturers will have to start taking notice though we are most probably talking years and new devices only, seeing updates are far and few between once they release a couple at the start to fix bugs.
You obviously missed the part where the researcher discovered he was competing with botnets and had to actually begin active warfare against them by "fixing" the boxes to get the project to work. AYJ
On 22 March 2013 09:25, Volker Kuhlmann
wrote: On Thu 21 Mar 2013 10:20:31 NZDT +1300, Juha Saarinen wrote:
Would I be right in assuming that the vulnerable devices situation is similar in NZ and Australia? That would appear to be an empty question to which we all knew the answer even before D-Link so impressively demonstrated earlier this year that they just couldn't care less about making their rubbish functional. The same researcher said the other manufacturers aren't all that different. Personally I rank all that gear in the same category of clunky...
Recent conference reports sound like teleconferencing equipment is in the same category too.
Pity all the users who don't or can't know any better.
Volker
-- Volker Kuhlmann is list0570 with the domain in header. http://volker.dnsalias.net/ Please do not CC list postings to me. _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog
NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog