He found that commands sent to the device via a certain connection, port 9000, were accepted without any authentication.
FORBES: More Than A Dozen Brands Of Security Camera Systems Vulnerable To Hacker Hijacking
It snaps into a USB port in the computer and acts as an authentication tool without which the user cannot access the files.
CNN: Mobile PCs can be risky on the road
应用推荐
模块上移
模块下移
不移动