Review:  TP-Link Tapo C560WS Security Camera

Posted in Commentary with tags on December 31, 2025 by itnerd

Outdoor security cameras are the in thing at the moment. For example here in Toronto, they are often used to watch over cars because car theft is a problem here, or to secure your home from break and enter scumbags. So I’m having a look at the TP-Link Tapo C560WS to see if this a viable option for your security camera needs. First some specs to get you started:

Resolution:4K

Connectivity: 2.4GHz + 5GHz Wi-Fi and Ethernet

Night Vision: IR + Full Color

Field of view: 326 degrees (horizontal), 53 degrees (vertical)

Storage: Up to 512GB via microSD + optional cloud storage

Two-way speaker: Yes

IP rating: IP66 (Water resistant against powerful jets)

Here’s a look at the camera itself:

It looks pretty much like any other security camera. There’s minimal branding on it.

There’s the speaker behind the camera:

Here’s the front of the camera with the IR illuminators that’s below the lens for night vision purposes and spotlight for lighting purposes. At the top is a rubber cover that behind it has the microSD card slot and a reset button.

So there is a cable that has two connections. When I saw the Ethernet connector, I thought “Oh this does Power Over Ethernet”. Well, it doesn’t. That’s a bit of a disappointment as I would rather run one cable to the camera rather than two to a camera. On top of that, for the best possible security you should connect this camera via Ethernet as car thieves in Toronto have been found to be using WiFi jammers to disable security cameras that are on WiFi. That’s clearly not going to happen if your camera is on Ethernet. The other connector is the power connector which appears to be a BNC or barrel style connector. That makes life easier if you have to run a power cable to the camera. Though I will note that the power adapter that comes with the camera has a pretty long cable.

Also included in the box is all the mounting hardware and screws as well as the waterproofing hardware for the cables.

Physically mounting the camera was pretty easy as I mounted it on my balcony. Then I used the Tapo app which is available for iOS and Android to get it onto my WiFi. I ended up using 2.4 GHz WiFi as it had better signal strength versus the 5 GHz network. I could then use the Tapo app to control it.

Let’s start with the visuals. I always got clear and detailed image when I tested it. Here’s a still image from the camera:

And here’s a video test:

One thing that I should point out is that I had the camera set to auto in terms of resolution. But the camera kicked into 4K mode for this clip. I could pick out snowflakes in the recording as well as footprints on the ground from 14 stories up. Very impressive!

I then did the same test at night. Here’s the still image:

And here’s the video:

I also tried the spotlight and it’s pretty bright based on this image:

What it also shows is that when spring comes around, I need to clean the glass on my balcony.

One thing that I should note is that black and white mode never triggered on this camera. I am guessing that this is because there was enough light to make going into that mode something that wasn’t required. But having said that, these pictures are outstanding.

Other highlights:

  • I could clearly hear audio from the camera and my voice was clearly audible. No issues here.
  • I did not test the AI features of this camera. But this camera is capable of recognizing faces on top of being triggered by motion. That can be handy to have the camera trigger actions based on who or what it sees. I should note that the AI features are on device.
  • Pan, tilt and zoom features were easy to use. The zoom was particularly impressive.
  • You get the option of TP-Link hosted cloud based storage via a subscription. That may be worth it if you want off device storage rather than using an microSD card inside the camera.
  • The camera supports Amazon Alexa and Google Home. But strangely, not Apple HomeKit.

The best thing about the TP-Link Tapo C560WS is the price. I found it for $120 CAD on Amazon. At that price, you could forgive the fact that it that it doesn’t have Power Over Ethernet for the best possible deployment. But if you look past that, this is a great choice for a security camera. It is easy to set up, has great video and audio, and has a variety of storage options. All for a pretty unbeatable price.

Review: Targus Voyager EXP Backpack

Posted in Products with tags on December 30, 2025 by itnerd

Chances are that this backpack from Targus is going to my wife after this review. I’ll explain why in a minute. But the backpack in question is the Voyager EXP backpack which is intended for someone who needs to carry their tech as well as a change of clothes. Here’s a look at the backpack:

It’s basic black so it will not attract any unwanted attention. If you look at handle at the bottom, it has some reflective elements on it.

On the side, there’s an expandable pocket for a water bottle.

On the back, there’s a pair of shoulder straps that are well padded and a strap to slide the backpack through. The back is ventilated and padded.

On one of the shoulder straps there’s a hidden pocket for your ID.

Back to the front. There’s a pocket with a strap for your keys.

There’s a bigger pocket with an RFID protection pocket which protects your passport or credit cards from any nefarious activity. There’s also a hidden pocket for an AirTag which is a welcome addition.

There’s another pocket on the top for your sunglasses. I would make sure that the sunglasses are in a case though.

This compartment allows you to fit a change of clothes along with some toiletries in the mesh section.

You can put up to a 17″ laptop into the upper pocket which is suspended off the ground to protect the laptop. Other bits and bobbles can got in the lower pocket. As you can see, it is designed to fold flat so that you can keep your laptop in the pocket at airport security. I should note that a TSA compliant lock can be used to keep this section locked.

Now let’s get to the part about why this backpack is going to my wife. When she goes into the office, she tends to take her work laptop along with gym clothes for an after work workout. The second that she saw this backpack she wanted it as it fits her use case better than the backpack that she was using. So it’s her’s if she wants it. The Targus Voyager EXP is $120 CAD directly from Targus. If you need a backpack for your tech and is also good for a day or two of travel, or to carry a change of clothes for whatever reason, this is a backpack that you should seriously look at.

Tax-Themed Phishing Campaign Targeting India

Posted in Commentary with tags on December 26, 2025 by itnerd

CloudSEK’s has published their latest research report highlighting an active and sophisticated phishing campaign targeting Indian users using income-tax themed lures.

Their analysis reveals how the Silver Fox threat actor is leveraging malicious ZIP and EXE files to deploy ValleyRAT, using techniques like process hollowing and abuse of trusted binaries to evade detection. The campaign is actively targeting individuals and organisations during the tax season, posing a serious risk to both personal and enterprise environments.

The report can be found here:  https://www.cloudsek.com/blog/silver-fox-targeting-india-using-tax-themed-phishing-lures

 Malicious NPM package called Lotusbail pulls of a supply chain attack to swipe data

Posted in Commentary with tags on December 24, 2025 by itnerd

Recently, a malicious NPM package called Lotusbail, masquerading as a WhatsApp Web API library, secretly intercepted authentication tokens, messages, contacts, and media from developers’ applications and exfiltrated the data after encrypting it to evade detection. The supply chain attack also hijacked WhatsApp’s device pairing process to give attackers persistent backdoor access to accounts, which remains even after uninstalling the package unless all linked devices are manually removed.

SecurityWeek has more on this here: https://www.securityweek.com/npm-package-with-56000-downloads-steals-whatsapp-credentials-data/

CEO of DryRun Security, James Wickett had this to say:

“Backdoors don’t just happen to other people. They happen inside real organizations, often through code that looks legitimate at first glance. Sometimes it’s a malicious dependency, sometimes it’s copied or AI-generated code, and sometimes it’s an internal actor abusing trust. As development accelerates, security teams need visibility into what’s being added to the codebase and the ability to flag suspicious behavior early, so risky changes get reviewed before they turn into credential theft or persistent access in production.”

Developers need to make sure that the code that they use is secure. Otherwise they will get into a situation that isn’t good for them or the people who use their apps.

Surfacing Threats Before They Scale: Why Primary Source Collection Changes Intelligenc

Posted in Commentary with tags on December 22, 2025 by itnerd

 Flashpoint has published a new blog post on how Primary Source Collection (PSC) enables intelligence teams to surface emerging fraud and threat activity before it reaches scale. The article explores:

  • How Threats Actually Evolve
  • Why Static Collection Falls Short
  • A Different Model: Primary Source Collection
  • Making Intelligence Taskable
  • How Taskable Collection Works in Practice

Why does this matter? Threat and fraud operations are moving faster than ever. Barriers to entry are lower. Tooling is more accessible. Collaboration rivals legitimate software development cycles. Defenders cannot afford to move slower than the adversaries they are trying to stop.

Primary Source Collection is how intelligence teams keep pace. It aligns collection with mission needs, enables real-time tasking, and delivers insight early enough to change outcomes instead of just documenting them. The signals have always been there – what has changed is the ability to surface them while they still matter.

Scam alert: Docusign phishing meets holiday loan scam

Posted in Commentary with tags on December 22, 2025 by itnerd

Forcepoint has a report that is literally hot off the press that covers something that I have personally experienced today.

With holiday financial stress peaking, Forcepoint has uncovered a sophisticated two-pronged scam campaign. Scammers are now pairing Docusign-themed phishing to hijack corporate credentials with convincing loan offer spam designed for identity theft.

The first threat uses spoofed ‘wine order’ documents to lure employees into entering logins on fake pages. Simultaneously, ‘Christmas Cheer Cash’ lures use professional marketing layouts to walk victims through a ‘loan application’ that harvests SSNs and bank details. I have received phishing emails matching the description of the first threat. These attacks are effective because they mimic standard end-of-year workflows.

You can get more details here: https://www.forcepoint.com/blog/x-labs/docusign-phishing-holiday-loan-spam

Liquibase Opens 2026 Database Change Survey

Posted in Commentary with tags on December 22, 2025 by itnerd

Liquibase today announced that it’s opened the Liquibase 2026 Database Change Survey for IT community participation. The survey is designed for practitioners, leaders, and contributors across the applications/database ecosystem, from database administrators and developers to platform, security, and compliance teams.

This survey offers thee survey gives the readership community a voice and weigh-in opportunity on how database change governance is evolving and where the sector should focus next. The survey contains a total of 20 questions and will take about 5 minutes to complete. Respondents can provide their email for a chance to win AirPods Pro 3.

To participate, visit: https://www.liquibase.com/liquibase-2026-database-change-survey

Why This Matters to Readers: Last year’s report gathered insights from professionals across 25 countries and revealed a striking reality: fewer than 8% of organizations had achieved full DevOps maturity, while 29% remained in the early stages. The growing complexity of data environments continued to hold many teams back, and the rise of AI and ML has only intensified the challenge – 25% of immature organizations identified it as their top concern.

This year’s survey will reveal what’s changed in 2025 and help the global IT community identify emerging issues, understand their relevance to the reader’s particular organization, and assess the best practices needed to meet AI and ML challenges head-on.

University of Phoenix Pwned…. 3.5 Million Individuals Impacted

Posted in Commentary with tags on December 22, 2025 by itnerd

The University of Phoenix has today begun notifying over 3.4 million individuals that their data was stolen in a hack by the notorious ransomware gang known as Cl0p. Yeah. That Cl0p. Clearly they’ve been busy this year by being naughty and not nice.

Rebecca Moody, Head of Data Research at Comparitech had this to say:

“According to our data, this is the fourth-largest ransomware attack in the world this year (based on records affected). It highlights the ongoing threat that companies face via ransomware — and not just via attacks on their own systems. Attacks on third parties like Oracle often give hackers access to a multitude of companies (and their data) via one central source. And as Clop is now rumored to be exploiting a new vulnerability through another software company (Gladinet CentreStack), its devastating data breaches look set to continue well into 2026.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech follows with this:

“Clop has been on a rampage this year, targeting zero-day vulnerabilities in software used by large enterprises. Specifically, it targets Oracle’s E-Business Suite and the Cleo file transfer software. This attack on the University of Phoenix is most likely related to the former.

According to our research, Clop has claimed the third-most data breaches of any ransomware gang in 2025.”

See: https://www.comparitech.com/news/ransomware-roundup-november-2025/

Chris Hauk, Consumer Privacy Champion at Pixel Privacy adds this:

“This is just the latest data breach of US universities, with Harvard University, the University of Pennsylvania, and Princeton University having been compromised by hackers, who stole the personal information of donors, students, alumni, staff, and faculty. We will surely see this trend continue, as bad actors around the world look to increase the size of their data cache from US educational institutions.

I would urge any individuals affected by this breach to take advantage of the university’s offer of free identity protection services, fraud reimbursement policy, one year of credit monitoring, identity theft recovery, and dark web monitoring. This will give them a leg up in detecting if bad actors are attempting to use the data gathered from the breach for nefarious purposes, as the information stolen includes dates of birth, social security numbers, and bank account and routing numbers.”

Finally, Ensar Seker, CISO of SOCRadar had this to say: 

“This breach underscores a troubling pattern we’ve seen throughout 2025: threat actors like Clop continuing to weaponize zero-day vulnerabilities and mass data exfiltration campaigns against large, centralized educational platforms with insufficient segmentation between student, staff, and supplier data.

Universities remain attractive targets due to sprawling digital ecosystems and a mix of legacy and cloud infrastructure. Attackers exploit these complexities often entering through third-party vendors or outdated portals—and move laterally across systems before exfiltrating millions of records. The fact that Clop accessed data tied to nearly 3.5 million individuals suggests minimal micro-segmentation or inadequate identity and access management (IAM) protocols.

Clop’s playbook is not new. They’ve repeatedly exploited MOVEit and other file transfer software to compromise vast amounts of sensitive data. Their ransomware operations are increasingly interwoven with pure data theft and extortion, leveraging leak sites and public shaming campaigns to pressure victims. In this case, the potential inclusion of personal data from students and faculty introduces FERPA, HIPAA, and contractual risk dimensions for University of Phoenix.

Given the scale and societal impact of this attack, it’s time for educational institutions to be held to the same cybersecurity standards as critical infrastructure. That includes mandatory vendor security assessments, data minimization strategies, and endpoint telemetry across hybrid environments. Breaches like this are not just IT issues,they’re national resilience risks when millions of PII records are involved.

Transparent forensic reporting, mass notification procedures, and proactive credit monitoring must be prioritized. From a policy standpoint, it’s time for federal regulators to reevaluate breach notification thresholds and introduce industry-wide frameworks tailored for academia.”

While Cl0p isn’t the only ransomware gang out there, they’ve clearly been busy. Which doesn’t bode well for any of us in 2026.

AGs Unite to Keep Gift Cards Safe

Posted in Commentary with tags on December 22, 2025 by itnerd

The Gift Card Fraud Prevention Alliance (GCFPA) today announced 14 state attorneys general (AGs) from across the United States have come together to launch a nationwide public service announcement (PSA) aimed at educating consumers about the threat of gift card fraud. This collaborative effort comes as millions of Americans prepare to redeem gift cards received during the holiday season—a prime opportunity for scammers to target unsuspecting individuals.

You can watch the PSA below:

The PSAs will run December 26, 2025, through January 31, 2026, and feature a unified message from state AGs that gift cards are safe while urging consumers to remain vigilant against gift card scams. The campaign highlights common fraud tactics, offers tips for safe gift card usage, and encourages the public to immediately report any incidents of gift card fraud to their respective state attorney general offices.

The GCFPA and participating AGs urge consumers to reject unsolicited demands for gift card payments, refrain from sharing gift card numbers or PINs with untrusted sources, check gift card balances only through retailers’ official websites and inspect packaging for signs of tampering. Consumers whose gift cards are drained or have been scammed should report the incident to their state attorney general’s office.

Participating AGs include:

Arkansas: Tim GriffinKentucky: Russell Coleman
Delaware: Kathy JenningsMichigan: Dana Nessel
District of Columbia: Brian L. SchwalbNevada: Aaron Ford
Georgia: Chris CarrOregon: Dan Rayfield
Illinois: Kwame RaoulPennsylvania: Dave Sunday
Iowa: Brenna BirdSouth Dakota: Marty Jackley
Kansas: Kris KobachWashington: Nick Brown

For more information about the PSA campaign and resources on preventing gift card fraud, please visit the Gift Card Fraud Prevention Alliance website or your state attorney general’s official page.

NordProtect adds new monitoring features to alert users on fraudulent activities

Posted in Commentary with tags on December 22, 2025 by itnerd

NordProtect is substantially improving its monitoring functionality to better inform and protect its users from financial losses by adding three‑bureau credit monitoring, as well as short‑term loan and financial account monitoring. Additionally, users will be able to lock and unlock their TransUnion credit file instantly.

NordProtect’s credit monitoring service now includes all three major credit bureaus. The service monitors a user’s credit file and alerts in case of suspicious activity – such as new accounts opened in the user’s name, changes to the credit score, or hard inquiries by a lender or company.

Additionally, NordProtect increases the scope of its monitoring service by adding two new features – short‑term loan monitoring and financial account monitoring.

Shortterm loan monitoring keeps track of payday loans, cash advances, and other short‑term borrowing that are often used fraudulently in identity theft schemes. By receiving an alert about an unauthorized request for a payday or short‑term loan, users can contact the lender immediately and report fraudulent activity.

Financial account monitoring tracks where user’s personal information (such as contact information, addresses, or beneficiaries) has been used to apply for new bank accounts or to make account holder changes to various financial accounts such as checking, savings, certificate of deposit, business, and IRA accounts. Reviewing flagged transactions or account changes enables users to notify their bank or card issuer promptly to help prevent financial losses.

Additionally, NordProtect users will now be able to use TransUnion’s credit lock feature, which allows users to lock and unlock their TransUnion credit file instantly and prevent new accounts from being opened in their name without authorization.

Currently, NordProtect is available only for users in the United States. For customers in the United Kingdom, Netherlands, France, Sweden, Germany, and Italy, NordVPN offers cyber insurance benefits as part of its service bundles. These benefits include scam‑loss recovery and online‑shopping fraud recovery.