Close Menu
Mobile SpecsMobile Specs

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025
    Facebook X (Twitter) Instagram
    Mobile SpecsMobile Specs
    • Home
    • 5G Phones
    • Android vs iOS
    • Brands
    • Budget Phones
    • Compare
    • Flagships
    • Gaming Phones
    • New Launches
    Mobile SpecsMobile Specs
    Home»5G Phones»More than 40,000 security camera feeds found online – your safety method is this
    5G Phones

    More than 40,000 security camera feeds found online – your safety method is this

    mobile specsBy mobile specsJune 25, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    More than 40,000 security camera feeds found online – your safety method is this
    Share
    Facebook Twitter LinkedIn Pinterest Email


    That porch cam is watching the door in front of you. Smart security camera that moves in your room at night. The cameras that your children see. Do you really believe that they are safe by locking their feeds and closing from the Internet? If you have not recently examined the settings of the cameras connected to your Internet, it is time to do so.

    Researchers from Bitesite’s trace have published a new report this month highlighting their latest discovery: 40,000 security cameras were exposed online and showed pictures of both homes and businesses. From offices and retail stores to factories as well as private residences, these cameras were showing online photos without a password or verification.

    Obviously, this is a great problem of privacy because these cameras are kept in our homes, including bedrooms and children’s rooms. Hackers can not only spy on the owners of these cameras, but also set them for extortion or use the information obtained from their feeds to plan a break.

    You can like

    In addition, according to malware bytes, a risk actor with SSH access (allows them to log in and control the device through a terminal, such as a regular computer), can enter any exposed camera’s hardware and software to expose any use of any exposed camera. The camera can then compromise on other devices on the victim’s domestic network or can even be used as a boot net.

    How does it happen? Home security cameras usually need the Internet or Wi -Fi connection, and these cameras often have their own web servers that users directly access an app or web browser to view video feeds. However, because of the way these feeds are exposed on the Internet, anyone can access them by typing in their IP address.

    The search for unsaturated feeds is also very easy because many shopkeepers do not establish any basic cybersonic hygiene or firmware update process of any kind. Similarly, while some rules have been established, the implementation has been contradictory. Meanwhile, consumers think of them as devices and just plug them and connect them without considering the security measures that should be taken first.

    How big is this problem? According to the report, the number of cameras exposed in the United States was around 14,000, with the highest number of them in California and Texas. Other countries affected (in order) include Japan, Austria, Czechia and South Korea.

    Get quick access to breaking news, the hottest reviews, big deals and helpful points.

    This is a problem that has occurred earlier: Bitsite got a similar problem in 2023 when online images of more than 40,000 unsafe cameras were running online.

    How to protect and secure your camera

    (Image Credit: Tom Guide)

    First, as you always have, you want to make sure you are using a strong and unique password for your cameras. However, you also want to make time to create them in the administrator or settings interface so that you can change their default password. At the same time, you want to regularly patch and update your devices (if possible) and set them automatically if you can.

    Secondly, if you have an internet -connected camera, make sure you do research in the brand that you are first considering whether it has any security reports in the past or a weakness that you may need to be informed about. Try to access it unsafe, without using login credentials and know that if you can, everyone can do.

    In addition, be aware of where you keep your camera. Think carefully before putting a camera in a bedroom or a bathroom like a bathroom. Also, if your camera has a privacy shutter feature, use it!

    More and more people have not stolen their safety and their packages to add the best home security cameras to their homes, the possibility of this problem will not be far away. That is why it is up to you to first research potential protective cameras and make sure you will close them completely when setup in your home.

    More from Tom Guide

    Today’s video is in indoor bull deals

    camera feeds Method online Safety security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUnihertz Titan 2 brings back the Kuveri keyboard, connects it with square 4.5 “display
    Next Article Family Main Season 3 OTT release: What do you need to know
    mobile specs
    • Website

    Related Posts

    Compare

    Alanzi 9L Camera Sling Bag with Tripod Holder B122 Review

    December 8, 2025
    Compare

    The Nikon ZR comes surprisingly close to a real red camera (for a lot less money).

    December 3, 2025
    Compare

    India has reportedly asked smartphone makers to pre-load state-owned cyber safety app Sanchar Sati on new devices.

    December 1, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Compare

    Honor Magic 8 Lite Review – gsmarena.com Test

    mobile specsDecember 8, 2025
    Compare

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    mobile specsDecember 8, 2025
    Compare

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    mobile specsDecember 8, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Our Picks

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    © 2026 MobileSpecs. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.