Closed Device Cameras: Paranoia or a Great Protection Tool



[ad_1]

Photo by Vladimir Ivanovo (VŽ)

There are countless smart device camcorders around the world, which aim to enter users’ devices and activate their cameras and microphones without the knowledge of the owners. Fearing this kind of data theft, people often record device cameras. This tool is useful, but you should not rely on the tape alone, as it will not protect against sound recording.

“More than 15,000 private cameras connected to the Internet are easily accessible,” according to a Wizcase study. This is because many of them have easily predictable security standards and “hacked” powers. To bypass security systems, it is often necessary to gain access to administrator rights, which can be granted by negligence, using fraudulent applications or visiting suspicious pages, even the owners of the devices ”, says Karolis Špiliauskas, Bitė Profas.

According to him, one of the most common ways that programmers gain access to cameras and microphones is through rogue apps. They are designed to leave no suspicion: they perform a real function, reminiscent of other trusted apps, but are actually dangerous because they ask for permission to control important functions of your phone or other device, including cameras and microphones.

To begin using gadgets, users must provide access to the requested functionality; otherwise the gadget just won’t work.

“The cameras on the devices are secretly activated, so the users using the device don’t even know that they are being monitored or filmed. To protect consumers from this, device manufacturers often install a brightly colored light next to the camera on their computer or tablet to indicate that the camera is active. There are still ways to turn off this light; in this case, it is practically impossible to recognize when they are following us, ”says K. Špiliauskas.

Such contamination of the device chambers is not carried out by chance, but by the specific selection of the victim; they are generally aimed at top managers, politicians or celebrities. Although much less common, hackers also target common users.

The aim of the attacks is to collect private or secret information that could be used to commit crimes in the future, such as identity theft, document falsification or blackmail.

How to protect yourself

To avoid such intrusions, it is important to carry out adequate prevention in advance. It is important to avoid clicking on links on unknown web pages or on emails from strangers. You also need to choose your software download source responsibly. For less experienced users, it is recommended to use only the official distribution platforms: Google Play (for Android), Apple App Store (for iOS) and Microsoft Store (for Windows). This does not guarantee protection, but it greatly reduces the chances of downloading the malware.

It is also recommended to buy games only on well-known platforms like Steam or Enegba, or on platforms from individual game makers like Origin (owned by Electronic Arts), Uplay (Ubisoft), GOG (CD Project RED) and so on. t.

“If you find a device that you like and that really looks safe, but can only be downloaded from an unknown website, look for it again in official stores. And after downloading a seemingly reliable app, carefully evaluate what kind of access it gives you to features. Allow only those functions of the phone or other device that are directly related to the purpose of the application. For example, navigation on your phone will definitely require permission to determine your location, but you will not need direct access to the camera at all, as it is not necessary when using the application. If such access is requested, it is better not to grant it ”, advises K. Špiliauskas.

It’s also important to keep your device up-to-date, protect your screen with a strong password or biometric lock that connects to accounts using dual authentication, and use open Wi-Fi networks more carefully.

The chamber is sealed

For fear of being unexpectedly monitored, users often seal the device’s cameras with opaque tape. A few years ago, a photo of the camera’s founder and CEO, Mark Zuckerberg, glittered next to his computer, sparking a debate about camera safety. The photo shows that the computer camera and speaker are sealed with opaque tape.

Even former director of the US Federal Bureau of Investigation (FBI) James Corney in 2016. He gave a speech at Canyon College in which he admitted to having a tape stuck on his computer camera.

This solution certainly protects from prying eyes (by the way, some manufacturers offer computers with special physical protections for the camera that can simply slide off and cover the camera), but it does not protect against eavesdropping.

About 50,000 different cyber incidents are recorded in Lithuania each year.

Get it free
WEEKLY TECHNOLOGY
to your inbox:

Write a comment



[ad_2]