Monday, December 8, 2025

Hackers arrested for guessing thousands of home IP surveillance camera passwords and capturing intimate videos

Four Korean suspects have been arrested for collectively hacking into over 120,000 IP surveillance cameras, allegedly by guessing the simple passwords chosen to protect them. These people acted independently, but they all appeared to have the same motive of capturing sexually intimate videos from cameras installed to monitor the interiors of victim's homes. Two of them were also caught then posting hundreds of these stolen videos for sale on a porn website.

Link to article: https://koreajoongangdaily.joins.com/news/2025-11-30/national/socialAffairs/Four-arrested-for-hacking-surveillance-cameras-to-produce-pornography/2466324 

 

Friday, December 5, 2025

CERN accelerates towards usable security with new password policy

CERN is a European organization that hosts scientific research and labs for experiments, like the Large Hadron Collider. Their network connects the scientists and staff needed to support these research efforts. Despite being based in Switzerland CERN recently announced changes to more closely follow guidance from the US NIST SP 800 63B standard on user passwords in their environment.

These changes included removing password character complexity requirements and establishing a minimum password length of 15 characters. This latter measure is typically adopted to eliminate the more often guessed short, common passwords and encourage the use of longer passphrases.

With password character complexity requirements no longer in place to encourage difficult-to-guess passwords CERN will instead rely on two blacklists of forbidden choices. The first is composed of simple passwords (like ‘123456’ and ‘CERN2025’), and the second contains “burnt” passwords. These so-called burnt passwords are publicly known by at least some password hackers. CERN learns of these by using the HaveIBeenPwned database and other repositories of passwords publicly exposed through data breaches.

CERN had already stopped forcing regular password changes with an annual expiration policy back in 2020. At that same time they’d implemented an adaptive password policy similar to the one the University of Pennsylvania recently adopted. Why that policy has now been simplified further to just a minimum password length isn’t discussed, but it may be to further reduce user confusion about how to create a compliant password. CERN was finalizing their deployment of Two-Factor Authentication (2FA) to users last year, so the security added with that change may have also reduced the need for a strict password policy.

Link to announcement: https://home.cern/news/news/computing/computer-security-password-evolutions