Security Concerns and Threats of Being Hacked from IoT and IP-Connected Devices

April 25, 2019

Security Concerns and Threats of Being Hacked from IoT and IP-Connected Devices

Hikvision Discusses IoT and Cyber Threats, Roles for Camera Manufacturers to Reduce Risk of Being Hacked


In the article, “Why Today’s Cyber Risk Is Greater Than Your Customers Think,” Security Sales & Integration (SSI) outlines security concerns related to IoT and IP-connected devices, and threats of being hacked by “nefarious actors.”

From the article: “Today’s hacking tools (whether ethical or not) maintain a very healthy head start over defensive measures. One can simply access websites that may have already done most of the research and probing for an attack of an aspiring hacker. It is possible to search for a target by name, find the location(s) and Internet service providers (ISPs), and, possibly, already have any stray equipment left hanging open to the Internet listed in a convenient format. Some hacker sites even go so far as to have a link to the programming and user guides for any equipment they find vulnerable. It may not even be necessary to get on the target property to physically touch the network to gain access.”

The author recommended that organizations prepare a threat assessment for customers’ businesses.

Read more at this link.


Hikvision’s director of cybersecurity, Chuck Davis, has authored numerous blogs discussing IoT and cyber threats, as well as roles that camera manufacturers can take to reduce the risk of being hacked. In a blog about Davis’ Campus Safety magazine interview on protecting IoT devices he said:

“Video surveillance systems, just like all systems that are part of the Internet of Things (IoT), are actually computers. So we tend to forget that all of these devices that we’re connecting to our IP networks, [which are]  ... adding all this great functionality to allow us to remotely monitor or control them, are actually computers. They have operating systems and they will have vulnerabilities. And so if we don’t take our proper due diligence and protect those things and really apply cybersecurity best practices, we put them at risk of being attacked, and [that] could be the way that a campus or an organization is attacked through the Internet.

IMPORTANT! This model requires non-standard firmware. Do Not Install standard firmware (e.g. v.4.1.xx) on this model. Doing so will permanently damage your system. You must use custom firmware v.4.1.25 from the iDS-9632NXI-I8/16S product page.

By downloading and using software and other materials available via this website, you agree to be legally bound by HIKVISION General Terms of Use . If you don’t agree to these terms, you may not download or use any of those materials.

If you are agreeing on behalf of your company, you represent and warrant that you have legal authority to bind your company to the General Terms of Use above. Also you represent and warrant that you are of the legal age of majority in the jurisdiction in which you reside (at least 18 years of age in many countries).