User Tools

Site Tools


intel

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
intel [2020-12-24 22:51:47] – [Remarks] jendaintel [2023-10-12 17:00:40] (current) – [Remarks] jenda
Line 50: Line 50:
   * [[http://betanews.com/2015/09/07/time-to-patch-your-firmware-backdoor-discovered-into-seagate-nas-drives/|Seagate]]   * [[http://betanews.com/2015/09/07/time-to-patch-your-firmware-backdoor-discovered-into-seagate-nas-drives/|Seagate]]
   * [[https://www.techdirt.com/blog/wireless/articles/20111213/00271717060/fbi-admits-that-it-uses-carrier-iq-law-enforcement-purposes-wont-say-how.shtml|HTC]], [[http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed|AT&T]]   * [[https://www.techdirt.com/blog/wireless/articles/20111213/00271717060/fbi-admits-that-it-uses-carrier-iq-law-enforcement-purposes-wont-say-how.shtml|HTC]], [[http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed|AT&T]]
-  * [[https://github.com/elvanderb/TCP-32764|Cisco, Linksys, NetGear]], [[http://www.theregister.co.uk/2014/07/02/cisco_you_cant_just_leave_your_ssh_keys_lying_around/|Cisco again]] and [[https://web.archive.org/web/20161010130021/https://www.helpnetsecurity.com/2016/01/14/cisco-kills-hardcoded-password-bug-in-wi-fi-access-points/|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2|again]] and [[http://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd|again]] and [[https://nvd.nist.gov/vuln/detail/CVE-2019-1804|again]].+  * [[https://github.com/elvanderb/TCP-32764|Cisco, Linksys, NetGear]], [[http://www.theregister.co.uk/2014/07/02/cisco_you_cant_just_leave_your_ssh_keys_lying_around/|Cisco again]] and [[https://web.archive.org/web/20161010130021/https://www.helpnetsecurity.com/2016/01/14/cisco-kills-hardcoded-password-bug-in-wi-fi-access-points/|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2|again]] and [[http://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd|again]] and [[https://nvd.nist.gov/vuln/detail/CVE-2019-1804|again]] and [[https://www.schneier.com/blog/archives/2023/10/cisco-cant-stop-using-hard-coded-passwords.html|again]].
   * [[http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor|Samsung]]   * [[http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor|Samsung]]
   * [[http://sekurak.pl/tp-link-httptftp-backdoor/|TP-Link]]   * [[http://sekurak.pl/tp-link-httptftp-backdoor/|TP-Link]]
Line 66: Line 66:
   * [[https://en.wikipedia.org/wiki/Printer_steganography|"All" laser printer manufacturers]]   * [[https://en.wikipedia.org/wiki/Printer_steganography|"All" laser printer manufacturers]]
   * [[https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html|Zyxel]]   * [[https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html|Zyxel]]
 +  * [[https://heimdalsecurity.com/blog/qnap-removes-backdoor-account/|QNAP]]
intel.1608846707.txt.gz · Last modified: 2020-12-24 22:51:47 by jenda

Except where otherwise noted, content on this wiki is licensed under the following license: Public Domain
Public Domain Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki