Israel-Gaza War

Have Cameras in the Home? Here's How to Stop An Enemy Hack

The National Cyber Directorate has published five simple instructions to prevent your cameras from being hacked and possibly used by the enemy.

Too many cameras are easily accessible by hostile parties. (Photo: Avshalom Sassoni, Flash 90)

As fighting continues in the south, the National Cyber Directorate has issued instructions to citizens to thoroughly check the security of their network cameras, change passwords, and if needed even shut them down to prevent their being hacked by hostile parties.

The Directorate stated that network cameras are a weak point as many of them do not contain secured access mechanisms and are very easily penetrated. This includes not only home-based cameras but also those used by businesses, organizations, and even governmental bodies.

According to the Directorate, although no such penetration has been identified during the fighting in the south so far, “we’ve seen this pattern in previous operations and this is therefore a possible and very likely scenario. It is not surprise: hackers from Iran or hostile countries have already shown how they penetrate the cameras of companies, even defense companies. Furthermore, penetrating a camera has served in the past as a means to spread documentation of an attack like the explosion at the Jerusalem bus stop by Hamas a few years ago.”

They also said that “the main fear is that penetration of security cameras can serve the enemy in collecting intelligence and spying. For instance, a camera observing sensitive areas like roads, junctions, public or defense installations can easily become a means of surveillance for hackers who take them over. It’s not hard to find a network camera. There are search engines which know how to map out the administrative interfaces of cameras, allowing internet access to their owner’s remote access.”

The Directorate ended their statement with a number of instructions and recommendations to tighten control of security cameras, recommending that anyone using such means check their equipment:

  • It is highly recommended that any camera you owned not be accessible online.
  • If the camera cannot be entirely cut off from the internet, it is highly recommended that access to it be limited to specific, recognized addresses, or that you use a VPN service with encryption and appropriately strong identification requirements.
  • It is highly recommended to change the default password in the cameras into a password that is long, complex, hard to guess.
  • It is highly recommended to periodically confirm the examination and installation of all relevant security updates by the camera’s manufacturer.
  • It is highly recommended to examine the area observed by the cameras, and if a sensitive installation is within view, to change the direction of the camera such that the installation is no longer visible.

0 Comments

Do not send comments that include inflammatory words, defamation, and content that exceeds the limit of good taste.

All because of Eli Feldstein, PM office to add AI division

Knesset approves bill to establish alternative intelligence department under Prime Minister’s Office

5
| Eliana Fleming, JFeed Staff | 20.11.24

Iranian Hackers, threats on Israel, Home Front Command

Foreign hacktivists impersonate Home Front Command to infiltrate Israeli phones

Eliana Fleming | 29.10.24

Apple Event, New gadgets and technology features, AI

Live Updates from Apple Event: Introducing Apple Watch Series 10 and Anticipated iPhone 16

Eliana Fleming | 09.09.24

Pavel Durov, Telegram, Indictment

Telegram's Durov in deep trouble: Arrested in France on serious charges 

Avi Nachmani | 29.08.24

Israel AI Worldwide ranking

Israel Ranks Fourth Globally in AI Advancement

Eliana Fleming | 15.08.24

Wiz, Cybersecurity, SoftBank

Wiz goes big in Asia: Lands major SoftBank partnership to boost investment 

Avi Nachmani | 08.08.24

Mobileye, Market Crash, High Tech

Mobileye founder makes bold move: Snaps up $10.4M in shares after market crash  

1
| Avi Nachmani | 07.08.24

Antitrust, Google

Federal U.S. court rules: Google is an illegal monopoly 

Gila Isaacson | 06.08.24

CrowdStrike, Delta

CrowdStrike scolds Delta: "It's not us, it's you!"

1
| Gila Isaacson | 05.08.24
Get JFeed App
Download on the App Store
Get it on Google Play