Jump to navigation

Home
  • PRODUCTS
    • Surveillance Systems
      • Geovision
        • IP Camera
        • Recording Systems
        • PoE Switch
        • Video Management
        • Video Capture Card
        • Video Server
        • LPR/ANPR
        • Hardware Accessory
    • Access Control
      • Geovision
        • Controllers
        • Accessories
        • Readers
        • Software
  • PROJECTS
    • Airports
    • Banking
    • Education
    • Entertainment
    • Government
    • Hotel
    • Industry
    • Retail
  • SOLUTIONS
    • Access Control
    • Airport Surveillance
    • Banking Surveillance
    • City Surveillance
    • Hotel Surveillance
    • Retail Surveillance
  • DOWNLOAD
    • Softwares
      • GV-Access for Android
      • GV-Access for iOS
      • GV-VMS
      • GV-Recording Server
      • CMS Lite
      • CMS Server
      • GV-ASManager
      • GV-AView for Android
      • GV-Backup Center
      • GV-CMS
      • GV-Center V2
      • GV-Center V2 Pro
      • GV-Cloud Center
      • GV-Control Center
      • GV-DVR
      • GV-Data Capture V3.1
      • GV-Dispatch Server
      • GV-Eye for Android
      • GV-Eye for iOS
      • GV-Failover Server
      • GV-GIS
      • GV-Hybrid DVR
      • GV-LPR
      • GV-Mobile Server
      • GV-NVR
      • GV-POS S/W Capture
      • GV-POS Text Sender
      • GV-Redundant Server
      • GV-Selector for Android
      • GV-Selector for iOS
      • GV-Video Gateway
      • GV-Video Wall
      • GV-Vital Sign Monitor
      • GV-Web Report
      • GVcloud NotifyApp for Android
      • GVcloud NotifyApp for iOS
      • GV‐Edge Recording-Mac
      • GV‐Edge Recording-Windows
    • Presentations
      • Geovision
        • Geovision VMS Pro
        • Geovision New Target Series
        • GV-PoE-extender
        • Geovision LPR Solution
        • GV-NVR Catalogue
        • Presentation 2016
        • GV-NVR Partner Catalogue
        • Catalogue 2014
    • Advertisements
      • Geovision
        • GV-VR360
    • Videos
    • Forms
      • Register Project
      • Partnership
      • Guarantee
  • REPORTS
    • Articles
    • News
  • ABOUT US
    • Introduction
    • Our Brands
    • Certificates
    • Distribution
    • Exhibitions
    • Publish
    • Media
  • SUPPORT
    • FAQ
      • Compact DVR & Video Server
      • DVR Capture card,Accessories
      • DVR/NVR Playback
      • DVR/NVR Software
      • IP Camera
        • Question Number 1
        • Question Number 2
        • Question Number 3
        • Question Number 4
        • Question Number 5
        • Question Number 6
      • Remote/Mobile Viewing
      • Retail Solution,POS integration
    • Guarantee
    • PARTNERS
    • RMA
    • Sales
    • Servises
    • Shipping
    • Training
  • TECHNOLOGIES
    • geovision
      • AI-LPR Geovision Solution
      • Emergency Lockdown/Unlock
      • GV-CS1320 Camera Reader
      • GV-LPR1200 LPR Camera
      • GV-NAS2008
      • GV-PPTZ7300 IP Camera
      • GV-SD2301 PoE
      • GeoVision Smart Factory
      • Geovision 12Mp Series
      • Geovision BuildingAutomation
      • Geovision Cloud Cameras
      • Geovision Decoder Box
      • Geovision End to End Solution
      • Geovision GV-AI FR
      • Geovision GV-AS1520
      • Geovision GV-CS1320
      • Geovision GV-Live Streaming
      • Geovision H.265 SNVR
      • Geovision H.265 Series
      • Geovision H.265 Solution
      • Geovision LPR Solution
      • Geovision PN400
      • Geovision PPTZ7300
      • Geovision PTZ+FISHEYE
      • Geovision Parking Solution
      • Geovision Pinhole IP Camera
      • Geovision-IPAS 2017
      • Introducing GV-VMS V.18.1.
      • Introducting GV-AI Server
      • Panoramic PTZ Series
      • Star Light Target
      • ntroducting GV-AI Server

Search

Shopping cart

Your shopping cart is empty.

User menu

  • Register
  • Login

Preventing Security Cameras from Being Hacked

Preventing Security Cameras from Being Hacked

Submitted by Robertpeege on Wed, 07/18/2018 - 14:27

 

Even the devices we rely on for security and privacy are susceptible to malicious attack. Use these tips to lower the odds of your security camera getting hacked.

 

As the number of connected gadgets around your home increases, so do your chances of getting hacked. Those odds are still very small, but it does happen. “Internet of things” devices pose a threat that their non-connected counterparts never did. They increase the number of gateways into your home by introducing vulnerabilities that didn't exist previously.

 

A connected home is full of possible weak links. Ironic as it may be, security cameras are often at the top of that list. And it's up to you to reduce the threat.

 

 

How security cameras are vulnerable

If a hacker wants to gain control of a video feed, there are two main ways that can happen: locally and remotely.

 

To access a camera locally, you would need to be in range of the wireless network the camera is connected to. There, a hacker would need to obtain access to the wireless network using a number of methods, such as guessing the security passphrase with brute force or spoofing the wireless network and jamming the actual one.

 

Within a local network, security cameras are not always encrypted or password-protected, since the wireless network security itself is typically considered enough of a deterrent to keep malicious attacks at bay. So once on the network, a hacker would typically have to do little else to take control of the cameras and potentially other IoT devices around the house.

 

Remote hacks are the far more likely -- and scary -- scenario. Something as common as a data breach could put your login credentials in the wrong hands, and short of changing your password frequently, there's not much you could do to prevent it from happening.

 

 

When a security camera transmits the video feed over the internet, the video signal could fall victim to password attacks, weak or default passwords and attacks that circumvent authentication on the security company's web servers altogether.

 

For hackers with a little know-how, finding the next target with an unsecured video feed is only a Google search away. It's unbelievable how many people, including businesses, setup security camera systems and can't be bothered to change the default username and password. Certain websites, such as Shodan.io, display just how easy it is to access unsecured video feeds or those with default logins by aggregating and displaying them for all to see.

 

 

 

How to know if you've been hacked

It would be almost impossible to know if your security cameras -- or worse, baby monitor -- has been hacked. Attacks could go completely unnoticed to an untrained eye, and most people wouldn't know where to begin to look to check.

 

A red flag for some malicious activity on a security camera is slow or worse than normal performance. Many cameras have limited memory, and when attackers leverage the cameras, CPU cycles have to work extra hard, making regular camera operations almost or entirely unusable at times.

 

Then again, poor performance isn't solely indicative of a malicious attack -- it could have a perfectly normal explanation, such as a poor connection or signal.

 

 

How to prevent getting hacked

While no one system is impervious to an attack, there are some precautions you can take to further decrease your odds of being hacked.

 

  • Secure your wireless network with WPA2.
  • When available, enable encryption within the security camera's administrative tools.
  • Protect the admin software with a username and password that cannot be easily guessed, even on a secured network.
  • Update the camera firmware frequently or whenever possible.

 

It is also suggested to put security cameras on a network of their own. While this would doubtless foil your plans for the perfect smart home, it would help prevent "land and expand," where an attacker gains access to one device and uses it to take control of other connected devices on the same network.

 

Taking that one step further, you can use a virtual private network, or VPN, to further restrict which devices can access the network the security cameras are on. You can also log all activity on the network and be certain there's nothing unusual happening there.

 

Again, the chances of being the victim of an attack like this are quite small, especially if you follow the most basic safety precautions. Using the above steps will provide multiple layers of security, making it increasingly difficult for an attacker to take over.

 

 

 

Adapted from: CNET

 

 

برچسب‌ها: 
IOT, cybersecurity, video surveillance cameras, Video Surveillance, IP camera, Security, Security equipment, Security system
  • Log in or register to post comments
  • CONSULT PLAN
  • REGISTER PROJECT
  • SELECT PRODUCT

FOLOW US

NEWSLETTER