Is my IP camera secure?

I have recently bought a cheap £20GBP IP camera from an online store.
It is branded as “aobo” but the logo was just stuck on and it appears to be a generic model which I have seen for sale under several different brands.
enter image description here

The camera uses a default username and password and is accessed using an app called “iSmartViewerPro”. There appears to be nowhere in that app where you can change the username or password and once the app is connected to the camera it is possible to view and control the camera from anywhere (even when not on the same network).

I have connected to my router to get the local IP address for the camera and I have tried to access that address in my browser, I am presented with a login box :

The server ##.##.##.## is asking for your username and password, The server reports that this is from IPCamera Login.

I tried the default username on the camera but that is not accepted – so it appears that there would be a different login for the web interface.

So, my question – should I be sceptical about this camera? How am I meant to know that it is secure / or is there anything I can do to restrict access to it?

Continue reading Is my IP camera secure?

Refurbishing an infected machine where the attacker had unrestricted physical access

Consider a scenario where the attacker had unlimited and unrestricted access to your desktop or laptop and their goal is to access your encrypted drives or the data on them.

Which steps are necessary or most important in ord… Continue reading Refurbishing an infected machine where the attacker had unrestricted physical access

Refurbishing an infected machine where the attacker had unrestricted physical access

Consider a scenario where the attacker had unlimited and unrestricted access to your desktop or laptop and their goal is to access your encrypted drives or the data on them.

Which steps are necessary or most important in ord… Continue reading Refurbishing an infected machine where the attacker had unrestricted physical access

Refurbishing an infected machine where the attacker had unrestricted physical access

Consider a scenario where the attacker had unlimited and unrestricted access to your desktop or laptop and their goal is to access your encrypted drives or the data on them.

Which steps are necessary or most important in ord… Continue reading Refurbishing an infected machine where the attacker had unrestricted physical access

What are the physical security features that prevent the cryptographic data on a SIM card being read?

In his excellent answer to “How does a SIM card prevent cloning?”, user Lie Ryan explains that SIM cards have their critical data stored in “tamper proof housing”, protected by “physical security measures [designed] to make r… Continue reading What are the physical security features that prevent the cryptographic data on a SIM card being read?

What are the physical security features that prevent the cryptographic data on a SIM card being read?

In his excellent answer to “How does a SIM card prevent cloning?”, user Lie Ryan explains that SIM cards have their critical data stored in “tamper proof housing”, protected by “physical security measures [designed] to make r… Continue reading What are the physical security features that prevent the cryptographic data on a SIM card being read?