By, uav-jp 22/04/2022

lifehacker lifehacker LifeHacker LifeHacker Is it true that a webcam or smartphone camera "voyeurs"?

Are hackers really voyeuring people through their smartphone cameras and webcams?

The answer is "Yes". It is possible that a webcam or smartphone camera will be hacked and a malicious person will have complete control over the camera's capabilities.

As a result, hackers can use the device's camera to voyeur individuals or retrieve personal information. Fortunately, however, there are ways to prevent or identify this type of activity on your smartphone or PC.

What hackers can do with the camera of someone else's device

Once hackers have access to the device, they may be able to turn the camera on and off, peep through the camera, take pictures with the camera, and even eavesdrop on the device's microphone. ..

On modern devices, you will see a light or icon when the camera is working. If none of the apps are using the camera and this light appears randomly, there may be a problem.

When a hacker breaks into your device, you may be looking for specific information rather than just a general snoop. But in many cases, hackers aren't aiming at individuals.

We are aiming for the data of security cameras owned by large companies. In one case, hundreds of hours of records from 150,000 security cameras installed in hospitals, warehouses, prisons, etc. were accessed.

However, individuals can also be targeted by hackers. Using malware and other malicious files, hackers can access the camera as well as passwords and important information stored on smartphones and PCs.

Cybersecurity measures can help protect your PC from these files and identify files if your PC is infected.

Face recognition and productivity trackers are dangerous

Larger organizations also use cameras to track individuals. Many universities are beginning to consider using facial recognition systems that track students and faculty with on-campus cameras.

Privacy experts have raised similar concerns with the new productivity tracking tools that have emerged in the last few years.

Many productivity tracking tools aren't that complicated. It simply tracks activity on the employee's PC, such as keystrokes and mouse movements, and reports the percentage of time the employee appears to be active.

We may also take screenshots and save them online for review by the manager.

However, recent trackers are beginning to experiment with somewhat invasive techniques, such as webcams that monitor employee attention.

According to market research firm Gartner, about 60% of large companies use productivity tracking software to manage their employees, but most of these employers use simpler tracking software. It seems.

Regulations limit what employers can and cannot track, but in some regions they may not be protected by law.

How to prevent voyeurism with the device's camera

If you are concerned about your privacy being compromised by your webcam, there is an easy way to prevent others from using your camera.

Put a privacy cover on your laptop webcam. A privacy cover is a small plastic cover that fits your webcam and slides open and closes.

If you cover the camera with this, nothing will be visible on the camera even if the camera is turned on.

Such covers are reasonably priced and can be purchased at most consumer electronics retailers and online shops. However, the cover alone does not prevent hackers from eavesdropping or using your PC if they hack into your device.

You can prevent hackers from using your camera by turning off your laptop or smartphone when you're not using it. However, "sleeping" devices may still be vulnerable.

Security measures function is also effective

To prevent hackers from using the camera, general cybersecurity measures such as those pointed out by CISA are effective. It is also essential to know how to tell if your PC is infected.

If your webcam lights up or flashes when you're not using it (for example, you haven't had a Zoom meeting or camera test), a hacker or malware is accessing your webcam. There is a possibility.

If you notice this, check your device's camera permissions to see which apps and services are using your camera.

The method is as follows.

You may find it surprising to check this way. Disable permissions for apps and services that you don't want to use your camera. OK with Skype. It's a good idea to disable apps that you haven't heard of before.

In addition, monitoring for storage files that look strange on your smartphone or PC, feeling strange about network movement, and unknown applications can also help you detect the aftereffects of malware.

In most cases, you don't need to download any other Windows antivirus program.

Built-in tools like Windows Defender aren't always effective, but current versions have the same functionality as most off-the-shelf antivirus.

You can protect your PC from most threats by making sure your antivirus software runs scans on a regular basis.

However, if you avoid suspicious links and files while browsing the web (don't click on weird links).

For Mac, consider enabling a firewall.

This built-in feature helps prevent malware that snatches your camera by blocking connections to unauthorized apps and services from the Internet and other devices.

The settings for this option are as follows:

"System Preferences" → "Security & Privacy" → "Firewall"

Talk to an expert if you have any doubts

If you suspect that your system is infected with a virus that your antivirus software cannot detect, bring your PC to a trusted repair shop or cybersecurity expert for further investigation.

Bringing your machine to a trained professional is the best way to identify and eliminate malware that is voyeurized by your camera.

Source: Norton, Bloomberg, Washington Post, GLOBALIZATION, CISA