johnherman
MIS
In the latest research, Rapid7 analyzed the workings of nine different baby-monitoring devices from eight different vendors. The company found significant vulnerabilities that could allow an attacker to access to the camera or run code on the actual device.
The service supporting one device used predictable URLs that an attacker could easily modify to gain access to other account holders' information. The design of a way to access video in real time led to a second vulnerability because the vendor put real-time video on a hosted service on the public Internet. A third vulnerability occurred in a poorly implemented service for sharing video with relatives and friends, resulting in the video stream being accessible to attackers.
==================================
adaptive uber info galaxies (bigger, better, faster, and more adept than agile innovative cognitive big data clouds)