Is This Another Camera Hacking Attack?

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

**** *** ******** *** ******* ** *** ****** ** ****** it ***** **** ******* **** ******** *** **** ******** ******* and **********/******** ** ******* ** ** ******** (****), *** ***** a *************.

*** ********* **** *** *** **** ****** ** *** ****** devices (***). *******, **** ** ********** * **** ** *** webserver **** **** *** ******, ** *** ***** *** **** uncommon ***** **** ****** **** ** **** ********* ** ****, any ****** ***** *** ****** ****** ***** ************* ** *********.

****** *** ***, ** **** **** ** *** *** ** see ** **** ******* **** * ****-***** ******.

*** ******** ****** ***:

*******
*******
*********
****
******
*********
*********

** *** ** *** ******** ************? ** *****, * **** know ****.

**** ****, **** ***** ** ****. ********** *** ************* **** within *** ******* *** **** ******** *** *************.

** *** ******* *** ** *** *** ** ******* ** a ****** ************.

***** **** *** ******* *** ****** **** **** ******* **** on *** * ***** ***, ****'* ********** ****.

*** **** *** ****** ** *** ******* *** **. *** you ****** ******* ** ******* ****?

***, ** ***** *** **.