Researchers say a Dropcam could be a weak point in the Internet of things. Patrick Wardle and Colby Moore tore apart a US$200 Dropcam and figured out how its software works. They found several vulnerabilities, none of which granted the holy grail of remote online access. Attackers can also use the implant code to run a scan on the network it is connected to, potentially uncovering other weak points for attack. Nest says such an attack would require physical access to the camera.”]

