7 Reasons Your Home Devices Are Not Safe From Hackers




How safe do you think your devices are from hackers when you’re at home?

You’d think it’s the safest place where privacy is a god-given gift, right? Well, research says you’re wrong. Hackers are innovative, persistent, and won’t back down easily. If they set their eyes on attacking you, you will get attacked.

Your phone’s turned off so you’re probably safe?

Turn off mobile phones icon

Think again. Even your baby monitors aren’t excused from the sly hands of these hackers. Find out below what other devices are vulnerable to attacks:

1.Webcam Spying

Web surveillance camera. Spying and safety on the Internet

Every device comes with a default password, which is why it’s imperative that you change this immediately after purchase. This is what happened in 2014 when Russian hackers managed to get into home security cameras and even baby monitors, and posted the videos online.

How? Below are just three of the many ways hackers can spy and steal from you:

IP-streaming cameras – Videos are streamed to an IP address using web-connected cameras.

Foscam – Foscam is a world leading home security IP camera provider. Their .54 version does not require a log-in to gain access to the feed.

TRENDnet – TRENDnet sparred with the FTC after transmitting user login credentials over the Internet. To date, there are still hundreds of their cameras that are very vulnerable to attacks.

Remote Administration Tools (RATs) – RATS basically lets you give another person access to your device. Normally used for tech support where your system is accessed by a more technical personnel to help you out with any system problems.

2.School Spying

School Spying

$600,000 was the price a Philadelphia school district had to pay for spying on its students. After issuing students laptops with (built-in cameras that shall be used only for when the laptop goes missing), it turned out that administrators took photos of their students without consent.

How did the administrators turn off the indicator lights on the laptops? By using malware.




3.Battery Spying

hand holding battery and smartphone on wood background

Who would have thought you’d get hacked just by charging your phone? This was the success of GeorgiaTech researchers who developed a hacking app that allows hackers to see the user’s every mobile activity after this user used a compromised charging station.

How was it done? Under two conditions: When a user connects their phone to a compromised charging station AND if that user unlocks their phone WHILE charged there. The hacking app was disguised as Facebook, and would be able to see sensitive data such as credit card details and passwords.

4.Smartphone Spying

comic masked man spying data from smartphone of teenager

Hackers were able to send fake updates to Samsung Galaxy users in 2015. This was due to a vulnerability in Samsung’s keyboard software. Fake updates allow hackers to view text messages, listen through the smartphone’s mic, see through the camera, and even install applications.




5.PC Spying

Young hacker with white drawn line thoughts

Dubbed as the frightening virus, the Flame virus infects computers and can also infect devices connected to the compromised computer via a Bluetooth connection. Flame can sniff out passwords hidden in asterisks, take screenshots of apps, but is not known to steal bank account information.




Click Next Button below to see more Reasons Your Home Devices Are Not Safe From Hackers…

Next →
NordVPN Best VPN Service
Information technologist, IT security analyst, leader in hacker techniques and countermeasures, solid background in network security and risk management with experience at multiple multi-national firms, creative thinker with problem-solving skills, blogger, writer, privacy advocate,

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>