![]() ![]() ![]() |
|
This isnt new, its been happening for a few months now
Theres alot of FUD on this topic. It would be nice to get some definite facts , TV should have been more proactive with investigations
& publishing findings & facts, theories
- some of those hacked turned out to have had compromised emails, from hacks on other sites
- some were reusing passwords , some using 4 digit pass .
- Just how many had a TV a/c & how many didnt ? Did anyone without a TV a/c get hacked ?
One great example of the FUD is all the claims of a "security expert" having his TeamV accessed, while he was using the PC
So, I have a look on his blog, all just too murky, this 'expert' says he had in the past compromised email, he never actually said if he
did or didnt reuse the same pass for multiple things (sounds like he did), admits other sites he used were hacked , possibly his a/c hacked ?
If TV had been hacked, Im sure this hack would have been in constant use before it got patched/fixed. Plenty of money to be made, so it would have
been alot more common (?)
I had an ISP who wanted me to install this on my PC the other day, so they could see what i could see on my PC. I said no, not just because of this security issue, but because my desktop is private, so think it is a bit of a privacy issue. But noticed more providers want people to install this to take control of peoples PCs. Not sure if they are aware of the reported potential security issue.
mattwnz:
I had an ISP who wanted me to install this on my PC the other day, so they could see what i could see on my PC. I said no, not just because of this security issue, but because my desktop is private, so think it is a bit of a privacy issue. But noticed more providers want people to install this to take control of peoples PCs. Not sure if they are aware of the reported potential security issue.
It's arguably the industry leader for remote support, but generally in the support situation you are describing the software wouldn't be permanently installed on your PC, a non installed version called TeamViewer QuickSupport would be used.
The current issue, is that people have setup TeamViewer accounts, which are linked to permanent installs on multiple PC's for permanent remote access, and have apparently reused credentials they have used elsewhere for such things, and not used strong passwords etc. Until proven otherwise this is an "idiot user" problem not a security issue with the software.
I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.
|
![]() ![]() ![]() |