“Internet-connected devices like video monitors provide convenience but without proper safeguards, they pose serious privacy risks,” DCA Commissioner Julie Menin said today in a statement. It’s not just the stories that make the news when a parent hears voices coming through the baby monitor or notices the camera following their every movement. Connected cameras and baby monitors have lots of known vulnerabilities, and many device owners may not even know they’re at risk.
A September 2015 report from security analytics provider Rapid7 gave eight of the nine baby monitors with cameras it analyzed an F (as in fail) when it came to security. The other received a D. The cameras were transmitting video without encryption or had easily cracked default passwords. HP conducted its own study and found that all the Internet-connected home security systems it tested had encryption and password issues. Some wouldn’t lock you out if you tried repeatedly to guess the password and others simply let you choose weak passwords or leave the default one in place. Back in 2014, an article published on Motherboard detailed a website that collected video streams from over 73,000 IP cameras whose owners never changed the devices’ default passwords.
As the DCA investigates, it has some advice for those with Internet-connected baby monitors: Do your research to see if your camera has known security vulnerabilities, regularly change your difficult-to-guess password, register your device to get firmware and other updates, and turn the camera off when you’re not using it.
Editors' Recommendations
- Best cheap home security camera deals for March 2021: Arlo, Nest, Ring, EZVIZ
- How to tell if your security camera has been hacked
- How to turn your old phone into a security camera
- How to find the IP address of your router for customization and security
- How to prevent your Ring smart cameras from being hacked