• Advertise
  • About us
  • Terms and Conditions
  • Contact us
Thursday, February 5, 2026
Australian Times News
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
Australian Times News
No Result
View All Result
Home Lifestyle

Hackers can access your mobile and laptop cameras and record you – cover them up now

Whether you use Zoom, Skype or Microsoft Teams, the webcam on your home PC or laptop device has probably never been as active as it is during this pandemic.

The Conversation by The Conversation
17-04-2020 09:00
in Lifestyle
Photo by Kari Shea on Unsplash

Photo by Kari Shea on Unsplash

David Cook, Edith Cowan University

Most of us have a camera built into our phone, tablet, laptop, or a desktop webcam we use for work, study or virtual socialising.

Unfortunately, this privilege can leave us vulnerable to an online attack known as camfecting. This is when hackers take control of your webcam remotely. They do this by disabling the “on” light which usually indicates the camera is active – so victims are none the wiser.

Many of our device cameras remain unsecured. In fact, research has suggested globally there are more than 15,000 web camera devices (including in homes and businesses) readily accessible to hackers, without even needing to be hacked.

Take a tip from Mark Zuckerberg

When your laptop is turned off its webcam can’t be activated. However, many of us keep our laptops in hibernation or sleep mode (which are different). In this case, the device can be woken by a cybercriminal, and the camera turned on. Even Mark Zuckerberg has admitted he covers his webcam and masks his microphone.

The number of recorded instances of image captured through unauthorised webcam access is relatively low. This is because most attacks happen without the user ever realising they’ve been compromised. Thus, these attacks go unaccounted for.

AlsoRead...

The evolution of Aesthetic Surgery through the lens of Dr. Kourosh Tavakoli

The evolution of Aesthetic Surgery through the lens of Dr Kourosh Tavakoli

4 December 2025
Design Australia Group: Redefining Drafting as the engine of housing growth

Design Australia Group: Redefining Drafting as the engine of housing growth

26 November 2025

It’s important to consider why someone would choose to hack into your home device. It’s unlikely an attacker will capture images of you for personal blackmail, or their own creepy exploits. While these instances do eventuate, the majority of illicit webcam access is related to gathering information for financial gain.

Say cheese!

Cybercriminals frequently attempt tricking people into believing they’ve been caught by a webcam hack. Everyday there are thousands of spam emails sent in a bid to convince users they’ve been “caught” on camera. But why?

Shaming people for “inappropriate” webcam use in this way is a scam, one which generates considerable ransom success. Many victims pay up in fear of being publicly exposed.

Most genuine webcam hacks are targeted attacks to gather restricted information. They often involve tech-savvy corporate groups carrying out intelligence gathering and covert image capturing. Some hacks are acts of corporate espionage, while others are the business of government intelligence agencies.

There are two common acquisition techniques used in camfecting attacks. The first is known as an RAT (Remote Administration Tool) and the second takes place through false “remote tech support” offered by malicious people.

Genuine remote tech support usually comes from your retail service provider (such as Telstra or Optus). We trust our authorised tech support people, but you shouldn’t extend that trust to a “friend” you hardly know offering to use their own remote support software to “help you” with a problem.

An example of an RAT is a Trojan virus delivered through email. This gives hackers internal control of a device.

Total access

When a Trojan virus infects a device, it’s not just the webcam that is remotely accessed, it’s the whole computer. This means access to files, photos, banking and a range of data.

The ability to install a RAT has been around for several years. In 2015, a popular RAT could be purchased on the internet for just US $40. The malware (harmful software) can be deployed via an email, attachment, or flash drive.

Those wanting to learn how to use such tools need look no further than YouTube, which has many tutorials. It has never been easier for hackers.

Webcams are everywhere

Our homes are getting “smarter” each year. In 2018, the average Australian household reportedly had 17 connected devices.

Let’s say there’s one or two laptops, three or four mobile phones and tablets, a home security camera system and a smart TV with a built-in camera for facial recognition.

Add a remote video doorbell, a talking doll named My Friend Cayla, the drone helicopter you got for Christmas, and the robot toy that follows you around the house – and it’s possible your household has more than 20 IP accessible cameras.

To better understand your vulnerabilities you can try a product like Shodan. This search engine allows you to identify which of your devices can be seen by others through an internet connection.

Practise ‘cyberhygiene’ at home

Placing a piece of black tape over a camera is one simple low-tech solution for webcam hacking. Turning your laptop or desktop computer off when not in use is also a good idea. Don’t let a device’s hibernation, sleep or low power mode lure you into a false sense of safety.

At work you may have firewalls, antivirus, and intrusion detection systems provided by your company. Such protections are void for most of us when working from home. “Cyberhygiene” practices will help secure you from potential attacks.

Always use secure passwords, and avoid recycling old ones with added numbers such as “Richmond2019”, or “Manutd2020”. Also, make sure your antivirus and operating system software is regularly updated.

Most of all, use common sense. Don’t share your password (including your home wifi password), don’t click suspicious links, and routinely clear your devices of unnecessary apps.

When it comes to using webcams, you may wonder if you’re ever completely safe. This is hard to know – but rest assured there are steps you can take to give yourself a better chance.

David Cook, Lecturer, Computer and Security Science,Edith Cowan University, Edith Cowan University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Tags: SB001
DMCA.com Protection Status

SUBSCRIBE to our NEWSLETTER

[mc4wp_form id=”2384248″]

Don't Miss

Lyca Mobile Australia’s Customer-First Overhaul Pays Off with Finder Award Win

by Fazila Olla-Logday
2 February 2026
Lyca Mobile Australia's Customer-First Overhaul Pays Off with Finder Award Win
Technology

Lyca Mobile Australia’s customer-first overhaul has earned a Finder Award, recognising its improved value, service, and stronger focus on Australian...

Read moreDetails

From Driveway to Dream Court: The Rise of High-Performance Hoops at Home in 2026

by Fazila Olla-Logday
20 January 2026
The Rise of High-Performance Hoops at Home in 2026
Sport

High-performance home basketball hoops are gaining momentum in 2026, as more homeowners invest in durable, professional-grade systems that combine advanced...

Read moreDetails

Brandon Willington: The Marketing Entrepreneur Turning Heads Across Australia

by Pauline Torongo
8 January 2026
Brandon Willington: The Marketing Entrepreneur turning heads across Australia
Business & Finance

Brandon Willington, founder of “Where U?” is changing the narrative for Australian businesses tired of inconsistent leads and empty promises.

Read moreDetails

How Turnkey Building Group Is Restoring Trust In An Industry Known For Customer Disappointment

by Fazila Olla-Logday
17 December 2025
How Turnkey Building Group Is Restoring Trust In An Industry Known For Customer Disappointment
Business & Finance

Turnkey Building Group is changing the narrative in an industry often associated with missed deadlines and broken promises. By prioritizing...

Read moreDetails

Risk Awareness for International Travellers – What Australians Should Know Before Entering Multi-State Regions

by Fazila Olla-Logday
10 December 2025
Schengen
Travel

This guide helps Australian travellers understand cross-border requirements, assess political and environmental risks, manage health and safety considerations, and prepare...

Read moreDetails

The evolution of Aesthetic Surgery through the lens of Dr Kourosh Tavakoli

by Pauline Torongo
4 December 2025
The evolution of Aesthetic Surgery through the lens of Dr. Kourosh Tavakoli
Health & Wellness

As global interest in Australian cosmetic surgery continues to grow, the combination of regulation, research and emerging digital tools is...

Read moreDetails

Ryan: Building real freedom through e-commerce

by Pauline Torongo
27 November 2025
Ryan: Building real freedom through e-commerce
Business & Finance

Ryan’s greatest achievement isn’t any single business or revenue milestone — it’s the ecosystem he’s built through the Change community.

Read moreDetails
Load More

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

  • About us
  • Write for Us
  • Advertise
  • Contact us
  • T&Cs, Privacy and GDPR
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status