The cameras connected to the Internet are increasingly present in our homes and we use them to increase security and have constant control over the spaces that we consider most important. But what we often forget is that these devices, if configured badly or left with their unchanged “factory” settings, can return against our own security becoming easily accessible to IT criminals. A study published by Corriere della Sera He claims that in Italy there are 74,000 cameras freely accessible on the Internet.
Surprising fact, access to private cameras connected to the internet is perpetrated by cybercriminals not through sophisticated IT attacks, but exploiting various lightness and inattention committed by the users themselves. Very often, these do not modify the default credentials, keep remote access active without necessity or do not update the firmware, i.e. the internal software of the device that regulates its operation. These errors are enough to offer the mercy of anyone the images captured by their cameras. Let’s see more closely what happens when the connected cameras turn into a threat to privacy and, above all, how to defend themselves.
What are the dangers of the connected cameras
The risks of this exhibition are numerous. Think, for example, of a camera positioned at the entrance of the house: an attacker could use it to understand when you are absent and try a theft. Or think of an internal webcam that resumes the living room: in this case, scenes of private life could be captured, even intimate moments (as demonstrated by the case of the conductor Stefano De Martino), with the risk of ending victims of blackmail or other unpleasant situations. In the office, the situation is not better: a video camera that frames a blackboard with confidential data or an employee’s workstation could accidentally disseminate sensitive information useful for competition. Even the production plants are not immune, because badly configured cameras can show procedures protected by industrial secret.
To these aspects is added the problem of social engineering, or the collection of small details on the lives of people to be used later to perpetrate targeted attacks. Through the recorded images, a criminal can discover the model of your car, the name of the dog or the presence of children at home, information that, combined with each other, become precious to create convincing scams or real identity thefts. It should not be forgotten that visual data can also support phishing activities, i.e. e-mails or deceptive messages built on the basis of real information concerning you.
How to protect yourself from the dangers of connected cameras
So how to do it to protect yourself? First of all, we suggest you check if the camera can be reached from outside the home network. To succeed, just deactivate the Wi-Fi on the smartphone and try to connect: if the video flow is visible without going from an official app or from an VPN connection (virtual private network that hides the IP address), it means that the camera is potentially exposed. The second step is to change the default credentials immediately. Devices often arrive with username and password (such as “Admin/Admin“O” admin/password “) that anyone can guess. A long, complex and unique password is the simplest and most effective size to increase safety.
Another crucial point is to disable remote access if you don’t need. If you use the camera only when you are connected to the home wi-fi, there is no reason to make it reachable from the internet. Do not forget to update the firmware: producers periodically release safety corrections, and ignore them means leaving known vulnerability open. For those who manage corporate networks, the measures must be even more rigorous: limited access via firewall, constant monitoring of logs and mandatory use of VPN for authorized personnel.
Last but not least, there is a good practice that is often neglected: isolating the cameras on a separate Wi-Fi network, for example that of guests, so that a possible compromised device cannot interact with the rest of the home network.









