While ADAMM S-UV won’t stick its harm down your throat, this semi-autonomous system can wave a UV wand around surfaces and even open drawers and closets to disinfect objects.(more…)
DSLR and mirrorless camera sales have crated, falling far below 2018 numbers in Q3 2019. Estimates point to about 3 million cameras sold in 2019, down from 9 million in 2018 and similarly dismal number sin 2016 and 2017.
The numbers truly began to fall in 2012 when smartphone cameras began to do DSLR tricks like bokeh and artistic lighting simulations. As a result, most photos are taken on phones and viewed on digital screens.
“Let me bring the parallels between servers and cameras into focus for you. Sony and its brethren have taken a page from the Sun playbook. They keep pushing cameras that have features, like higher megapixels, that most people don’t use or don’t care about. And the executives don’t seem to get a key fact about the market reality: what we do with with cameras and photos has changed,” wrote Om Malik, an investor and photographer.
A long time ago, Sun Microsystems CEO Scott McNealy quipped, “Technology has the shelf life of a banana. By the time you buy it, implement it and train people on it, it’s obsolete.” He was talking about servers, but I can’t help but think that his words are just as true for cameras,” he wrote.
Ransomware is usually associated with PCs run in the bowels of some antiquated IT department. Now, however, researchers have figured out how to move the stuff onto your DSLR – with catastrophic results.
The ransomware essentially infects a high end camera and then encrypts all of the photographs on the card. Check Point has create a proof-of-concept that lets hackers connect to a camera via Wi-Fi and inject the code, essentially shutting down the camera until a ransom is paid. They write:
Our research shows how an attacker in close proximity (WiFi), or an attacker who already hijacked our PC (USB), can also propagate to and infect our beloved cameras with malware. Imagine how would you respond if attackers inject ransomware into both your computer and the camera, causing them to hold all of your pictures hostage unless you pay ransom.
The researchers used an open source OS for the Canon EOS 80D, by probing it for exploits, were able to upload the ransomware and activate it. Once a malicious payload is uploaded wirelessly the camera will load it automatically and go into lockdown. “There is a PTP command for remote firmware update, which requires zero user interaction,” wrote the researchers. “This means that even if all of the implementation vulnerabilities are patched, an attacker can still infect the camera using a malicious firmware update file.”
The result? Your camera is toast unless you pay up.
Luckily this is just a proof-of-concept and the attack isn’t in the wild yet. That said, keep your camera close by when you’re in sketchy areas. You never know when a hacker might strike.