Your Security Resource

Talk. Norton. Now. Join Our Forum.
Unlimited help. Every device. 24/7.

Are Hackers Using Your Webcam to Watch You?

Kim Boatman
Find Under: Prevention

Steven Fox, an IT security expert, was chatting with friends on his webcam one night when he started receiving some strange emails. Imagine his surprise when he opened one and found images of himself chatting.

His webcam had been hacked by a “script kiddie,” a person who uses malware written by someone else to show off their skills at accessing other computer systems, says Fox. He quickly detached the webcam, but he had to re-install his operating system after he found malware installed on his computer. “It was painful, but it was a learning experience,” says Fox, who writes a column for the journal of the Information Systems Security Association.

The risks of webcams
Webcams may let you stay in touch with friends and family, but they also pose risks of people hacking into them and spying on you. A recent Pennsylvania lawsuit accused a school district of using webcams on school-issued laptops to spy on students and their families. And in China, a sophisticated network of hackers known as GhostNet has cracked 1,295 webcams in 103 countries.

Since most laptops now come with a built-in webcam, it’s critical to understand the risks, says Richard Stiennon, a malware expert with IT-Harvest, a research firm that specializes in Internet security. “We all have to become aware that our every action could be watched,” says Stiennon.

How hackers attack
webcams
Most hackers utilize so-called Trojan horse attacks, says Stiennon. You click on an attachment or download a piece of music or video infected with malware, and a hacker is able to remotely control your PC’s functions.

Fortunately, you can take steps to secure your webcam. Experts offer these do’s and don’ts:

  • Don’t click on suspicious attachments. You’ve heard it before, but too often we click without thinking. Email attachments remain a prime source for malware. Be wary of those supposedly funny emails forwarded by friends and family. You should also avoid suspicious sites offering free downloads of music, TV shows or videos.
  • Do use a firewall. “Firewalls provide a measure of protection against unwanted traffic,” explains Fox. Your computer comes with a firewall, but you need to make sure it’s turned on. If you use a Windows operating system, click on the Windows symbol in the lower-left corner of your screen, search for Windows Firewall, and you’ll be able to check the firewall settings. If you use a Mac OS, open System Preferences, click on the Sharing icon, select the Firewall tab and click Start.
  • Do use strong anti-virus software. Install a security suite that offers malware and spyware protection, then make sure you keep the protection up to date.
  • Don’t keep PCs with webcams in bedrooms. Limit webcam use to high-traffic areas, and remind family members not to do anything in front of a webcam they wouldn’t want the world to see.
  • Do secure your wireless connection. Make sure your wireless connection is protected with a unique password (not the default one that came with the router).
  • Don’t talk to strangers. Avoid IM conversations with people you don’t know, and advise your kids to do the same.
  • Do be cautious about accepting tech help. Would-be hackers have been known to ingratiate themselves with acquaintances by offering computer help. But that gives them the chance to rig webcams so they can spy on the computer user.
  • Do look for the indicator light. On external webcams, you’ll usually see a red light indicating the camera is on. Laptops with internal webcams usually have a blue LED indicator. If you use an external webcam, simply detach it from the USB port when it’s not in use.

In the end, your best bet is to use a decidedly low-tech solution, say the experts. “The ultimate security control is to cover the lens,’’ Fox says. If your webcam doesn’t come with a lens cover, use an adhesive bandage or even a yellow sticky note to cover it up. (Just make sure nothing sticky is touching the lens itself, so you don’t damage it.) “It sounds silly, but it gives you positive feedback that no one is spying on you,” says Stiennon.

Copyright (c) Studio One Networks. All rights reserved.

Welcome to the newly redesigned Security Resource center.

Get easy access to articles, the Norton community, and links to product support and upgrades.

Expert Q & A

Am I creating a security risk when I leave my computer turned on and connected to the Internet 24/7?
Answer

Glossary

Find definitions on commonly used Internet security related terms.
View Glossary