Reliable home IP cam app for baby monitoring
I hooked up a few poe Reolink cameras this weekend, including one in our nursery to replace a failing wireless baby monitor. Long story short, the camera is great - image quality is superb.Problem is, I set my wife up with an old android tablet and a cam monitoring app and after leaving for work she called to say it was displaying an afterimage and not an up to date image of our sleeping child. Hence, we are worried about reliable, real-time updating through the night. I have developer mode on and stay-awake set on my tablet to prevent the tablet from shutting down at night time. Still, I’m worried about apps going to sleep or not otherwise staying active in real time.I’m toying with getting an audio only baby monitor and using the video as an as-needed addition. Still, that kind of defeats the purpose of this whole exercise of mine. Anyone have any recommendations for rock solid apps (android or iOS - ideally one of each). I’d love for the screens to go to sleep while the audio remains on in the background. I haven’t been able to find any reasonably priced dedicated handheld monitors (like a traditional baby monitor) to couple with my hardwired camera (which could be reached via WiFi over my home network).Thanks for any ideas.
Submitted October 30, 2017 at 09:13PM by anjo212
via reddit http://ift.tt/2igpEQ8
I hooked up a few poe Reolink cameras this weekend, including one in our nursery to replace a failing wireless baby monitor. Long story short, the camera is great - image quality is superb.Problem is, I set my wife up with an old android tablet and a cam monitoring app and after leaving for work she called to say it was displaying an afterimage and not an up to date image of our sleeping child. Hence, we are worried about reliable, real-time updating through the night. I have developer mode on and stay-awake set on my tablet to prevent the tablet from shutting down at night time. Still, I’m worried about apps going to sleep or not otherwise staying active in real time.I’m toying with getting an audio only baby monitor and using the video as an as-needed addition. Still, that kind of defeats the purpose of this whole exercise of mine. Anyone have any recommendations for rock solid apps (android or iOS - ideally one of each). I’d love for the screens to go to sleep while the audio remains on in the background. I haven’t been able to find any reasonably priced dedicated handheld monitors (like a traditional baby monitor) to couple with my hardwired camera (which could be reached via WiFi over my home network).Thanks for any ideas.
Submitted October 30, 2017 at 09:13PM by anjo212
via reddit http://ift.tt/2igpEQ8
reddit
Reliable home IP cam app for baby monitoring • r/security
I hooked up a few poe Reolink cameras this weekend, including one in our nursery to replace a failing wireless baby monitor. Long story short, the...
Messing with the Google Buganizer System for $15,600 in Bounties
http://ift.tt/2xAgbty
Submitted October 30, 2017 at 09:54PM by FireFart
via reddit http://ift.tt/2yZEbrE
http://ift.tt/2xAgbty
Submitted October 30, 2017 at 09:54PM by FireFart
via reddit http://ift.tt/2yZEbrE
Medium
Messing with the Google Buganizer System for $15,600 in Bounties
Easy Bugs for Hard Cash
Researchers Devise 2FA System That Relies on Taking Photos of Ordinary Objects
http://ift.tt/2hjK4br
Submitted October 30, 2017 at 09:51PM by ZeroManArmy
via reddit http://ift.tt/2zRESCk
http://ift.tt/2hjK4br
Submitted October 30, 2017 at 09:51PM by ZeroManArmy
via reddit http://ift.tt/2zRESCk
BleepingComputer
Researchers Devise 2FA System That Relies on Taking Photos of Ordinary Objects
Scientists from Florida International University and Bloomberg have created a custom two-factor authentication (2FA) system that relies on users taking a photo of a personal object.
ROCA vulnerability - technical details in ACM Digital Library
ACM has just published the full paper in its Digital Library at http://ift.tt/2zQqGcY Some interesting charts of the CPU cycles needed for particular key lengths - mostly academical, with the notable exception of 3k keys. The cost of the attack of 2k RSA keys seems to be derived from Amazon EC2 x2 instance (2 cores) - my feeling is that the cost is fairly conservative. GPU-optimized versions are bound to make 2k key cracking quite affordable.http://ift.tt/2goKrUN - original public announcementhttp://ift.tt/2ylpMrM - test suite and link to offline tool
Submitted October 30, 2017 at 09:20PM by dc352
via reddit http://ift.tt/2yYIR0Q
ACM has just published the full paper in its Digital Library at http://ift.tt/2zQqGcY Some interesting charts of the CPU cycles needed for particular key lengths - mostly academical, with the notable exception of 3k keys. The cost of the attack of 2k RSA keys seems to be derived from Amazon EC2 x2 instance (2 cores) - my feeling is that the cost is fairly conservative. GPU-optimized versions are bound to make 2k key cracking quite affordable.http://ift.tt/2goKrUN - original public announcementhttp://ift.tt/2ylpMrM - test suite and link to offline tool
Submitted October 30, 2017 at 09:20PM by dc352
via reddit http://ift.tt/2yYIR0Q
keychest.net
KEYCHEST - web expiry management for SSL with competitive cert purchasing
KEYCHEST - web expiry management for SSL with competitive cert purchasing.
Fixed-price unlimited use. SSL/HTTPS and fuzzing phishing awareness.
Fixed-price unlimited use. SSL/HTTPS and fuzzing phishing awareness.
Escalating XSS in PhantomJS Image Rendering to SSRF/Local-File Read
http://ift.tt/2A0DApL
Submitted October 30, 2017 at 05:13PM by albinowax
via reddit http://ift.tt/2A0NBTA
http://ift.tt/2A0DApL
Submitted October 30, 2017 at 05:13PM by albinowax
via reddit http://ift.tt/2A0NBTA
Firefox takes a bite out of the canvas ‘super cookie’
http://ift.tt/2zgIIsx
Submitted October 30, 2017 at 08:55PM by sidcool1234
via reddit http://ift.tt/2xAmwVC
http://ift.tt/2zgIIsx
Submitted October 30, 2017 at 08:55PM by sidcool1234
via reddit http://ift.tt/2xAmwVC
Naked Security
Firefox takes a bite out of the canvas ‘super cookie’
Finally, one of the major browsers is doing something about canvas fingerprinting
http://ift.tt/2zYcVcU
http://ift.tt/2zYcVcU
Submitted October 30, 2017 at 12:26AM by Mysterii8
via reddit http://ift.tt/2yZZN7i
http://ift.tt/2zYcVcU
Submitted October 30, 2017 at 12:26AM by Mysterii8
via reddit http://ift.tt/2yZZN7i
Medium
Short story about S3 bucket, python noscript, thousands of data and Australian Government
TL;DR If there is any list which contains leaks (email — password) from Amazon S3 we can add: 1470 records from AEC (Australian Electoral…
ROCA vulnerability - the full paper available online
ACM has just published the full paper in its Digital Library athttp://ift.tt/2zQqGcYSome interesting charts of the CPU cycles needed for particular key lengths - mostly academical, with the notable exception of 3k keys.The cost of the attack of 2k RSA keys seems to be derived from Amazon EC2 x2 instance (2 cores) - my feeling is that the cost is fairly conservative. GPU-optimized versions are bound to make 2k key cracking quite affordable.
Submitted October 30, 2017 at 09:08PM by dc352
via reddit http://ift.tt/2gMfJlc
ACM has just published the full paper in its Digital Library athttp://ift.tt/2zQqGcYSome interesting charts of the CPU cycles needed for particular key lengths - mostly academical, with the notable exception of 3k keys.The cost of the attack of 2k RSA keys seems to be derived from Amazon EC2 x2 instance (2 cores) - my feeling is that the cost is fairly conservative. GPU-optimized versions are bound to make 2k key cracking quite affordable.
Submitted October 30, 2017 at 09:08PM by dc352
via reddit http://ift.tt/2gMfJlc
reddit
ROCA vulnerability - the full paper available online • r/netsec
ACM has just published the full paper in its Digital Library at...
Introducing GoCrack: A Managed Password Cracking Tool
http://ift.tt/2homgDd
Submitted October 30, 2017 at 08:54PM by Extremite
via reddit http://ift.tt/2ziVPt4
http://ift.tt/2homgDd
Submitted October 30, 2017 at 08:54PM by Extremite
via reddit http://ift.tt/2ziVPt4
FireEye
Introducing GoCrack: A Managed Password Cracking Tool « Threat Research Blog
FireEye's Innovation and Custom Engineering team released a tool called GoCrack that allows red teams to efficiently manage password cracking tasks across multiple GPU servers by providing an easy-to-use, web-based real-time UI to create, view, and manage…
Our computers, ourselves: digital vs. biological security
http://ift.tt/2yUinjd
Submitted October 31, 2017 at 12:05AM by screen317
via reddit http://ift.tt/2ltsyWI
http://ift.tt/2yUinjd
Submitted October 31, 2017 at 12:05AM by screen317
via reddit http://ift.tt/2ltsyWI
Malwarebytes Labs
Our computers, ourselves: digital vs. biological security
How are computer and biological viruses the same? We compare the two, and what we do to fight them—it's digital vs. biological security.
Mozilla Wants to Distrust Dutch HTTPS Provider Because of Local Dystopian Law
http://ift.tt/2zi3qZf
Submitted October 30, 2017 at 11:48PM by DJRWolf
via reddit http://ift.tt/2xAKIHA
http://ift.tt/2zi3qZf
Submitted October 30, 2017 at 11:48PM by DJRWolf
via reddit http://ift.tt/2xAKIHA
BleepingComputer
Mozilla Wants to Distrust Dutch HTTPS Provider Because of Local Dystopian Law
Mozilla engineers are discussing plans to remove support for a state-operated Dutch TLS/HTTPS provider after the Dutch government has voted a new law that grants local authorities the power to intercept Internet communications using "false keys."
A Guide to Attacking Domain Trusts
http://ift.tt/2yZGZoH
Submitted October 31, 2017 at 01:05AM by juken
via reddit http://ift.tt/2yYdg1x
http://ift.tt/2yZGZoH
Submitted October 31, 2017 at 01:05AM by juken
via reddit http://ift.tt/2yYdg1x
Posts By SpecterOps Team Members
A Guide to Attacking Domain Trusts
It’s been a while (nearly 2 years) since I wrote a post purely on Active Directory domain trusts. After diving into group scoping, I realized a few subtle misconceptions I previously had concerning…
Linux Privilege Escalation using weak NFS permissions
http://ift.tt/2iiaWrV
Submitted October 31, 2017 at 02:20AM by InformationSecurity
via reddit http://ift.tt/2ihVax9
http://ift.tt/2iiaWrV
Submitted October 31, 2017 at 02:20AM by InformationSecurity
via reddit http://ift.tt/2ihVax9
Haider Mahmood Infosec Blog
Linux privilege escalation using weak NFS permissions
Linux privilege escalation, lateral movement in linux, Linux Privilege Escalation using weak NFS permissions, linux localroot access, NFS hacking.
A Masscan Tutorial and Primer
http://ift.tt/2gLDVnN
Submitted October 31, 2017 at 02:50AM by danielrm26
via reddit http://ift.tt/2ig7ezf
http://ift.tt/2gLDVnN
Submitted October 31, 2017 at 02:50AM by danielrm26
via reddit http://ift.tt/2ig7ezf
Daniel Miessler
A Masscan Tutorial and Primer
Basics Background Installation Single-port Scans Multi-port Scans Scan Top Ports Options Scanning Fast Excluding Hosts Saving Your Configuration Output Nma
Can someone copy or install files into my laptop using a usb connected phone?
If so, is there a way for me to check for that?
Submitted October 31, 2017 at 04:53AM by Opportunityinrisk
via reddit http://ift.tt/2yY8DVx
If so, is there a way for me to check for that?
Submitted October 31, 2017 at 04:53AM by Opportunityinrisk
via reddit http://ift.tt/2yY8DVx
reddit
Can someone copy or install files into my laptop... • r/security
If so, is there a way for me to check for that?
Oracle Security Alert CVE-2017-10151
http://ift.tt/2xvrvHu
Submitted October 31, 2017 at 05:22AM by bagaudin
via reddit http://ift.tt/2iNoHTo
http://ift.tt/2xvrvHu
Submitted October 31, 2017 at 05:22AM by bagaudin
via reddit http://ift.tt/2iNoHTo
reddit
Oracle Security Alert CVE-2017-10151 • r/security
7 points and 0 comments so far on reddit
Sandbox your applications with Firejail
http://ift.tt/2hmeutt
Submitted October 31, 2017 at 06:38AM by unquietwiki
via reddit http://ift.tt/2z1V2dd
http://ift.tt/2hmeutt
Submitted October 31, 2017 at 06:38AM by unquietwiki
via reddit http://ift.tt/2z1V2dd
reddit
Sandbox your applications with Firejail • r/netsec
14 points and 0 comments so far on reddit
Heathrow Airport launching a probe after a USB was found
http://ift.tt/2lsxtqI
Submitted October 31, 2017 at 07:39AM by securitynewsIO
via reddit http://ift.tt/2zTdcNw
http://ift.tt/2lsxtqI
Submitted October 31, 2017 at 07:39AM by securitynewsIO
via reddit http://ift.tt/2zTdcNw
Protect - a comprehensive home security system from Ring
Ring introduced a comprehensive home security system called Protect to monitor the indoors of houses.
Submitted October 31, 2017 at 12:16PM by CIOBulletin
via reddit http://ift.tt/2iiZWdR
Ring introduced a comprehensive home security system called Protect to monitor the indoors of houses.
Submitted October 31, 2017 at 12:16PM by CIOBulletin
via reddit http://ift.tt/2iiZWdR
reddit
Protect - a comprehensive home security system from Ring • r/security
reddit: the front page of the internet
Blades Power Generation Brings Top-End Emergency Power Generation Units
Blade Power Generation specialises in meeting client demands with optimal emergency power generation. From manual and automatic transfer switches to used/new generator units, the company always maintains the British Standards in each of their exclusive offerings. They supply their power generation units for both personal homes and corporate offices. Plus, they cater to the extra security needs of large scale establishments.
Submitted October 31, 2017 at 11:48AM by bladespower
via reddit http://ift.tt/2gPnhn1
Blade Power Generation specialises in meeting client demands with optimal emergency power generation. From manual and automatic transfer switches to used/new generator units, the company always maintains the British Standards in each of their exclusive offerings. They supply their power generation units for both personal homes and corporate offices. Plus, they cater to the extra security needs of large scale establishments.
Submitted October 31, 2017 at 11:48AM by bladespower
via reddit http://ift.tt/2gPnhn1
reddit
Blades Power Generation Brings Top-End Emergency... • r/security
Blade Power Generation specialises in meeting client demands with optimal emergency power generation. From manual and automatic transfer switches...
Firefox takes a bite out of the canvas ‘super cookie’
http://ift.tt/2zgIIsx
Submitted October 31, 2017 at 12:39PM by wfpoulet
via reddit http://ift.tt/2hrk3al
http://ift.tt/2zgIIsx
Submitted October 31, 2017 at 12:39PM by wfpoulet
via reddit http://ift.tt/2hrk3al
Naked Security
Firefox takes a bite out of the canvas ‘super cookie’
Finally, one of the major browsers is doing something about canvas fingerprinting