Tag: cctv
-
Smart glasses are back, privacy issues included
AI smart glasses are the latest addition to fashion, and they include a camera, a microphone, AI, and privacy risks. After Google Glass failed to gain traction more than a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/05/ai-smart-glasses-privacy-risk/
-
Research: Predator spyware can turn off Apple indicators showing when microphone, camera are in use
The new research from Jamf Threat Labs demonstrates how Predator spyware can stay hidden on targeted phones by “intercepting sensor activity” to hide the indicators. First seen on therecord.media Jump to article: therecord.media/predator-spyware-iphone-camera-microphone-indicators
-
Chinese Money Laundering Jargon via Google’s Gemini
After having a short discussion with Gemini about Chinese Money Laundering, I could tell we weren’t quite connecting on my Mandarin-assistance requests, so I shared an example post from a Telegram “Crime-as-a-Service” group that was part of a Chinese Guarantee Syndicate. For context, these posts were made in the Tudou Guarantee Syndicate’s group dedicated to…
-
California city turns off Flock cameras after company shared data without authorization
The cameras will stay off until the Mountain View City Council can discuss how to handle the matter at a February 24 meeting, Police Chief Mike Canfield said in a letter to the community. First seen on therecord.media Jump to article: therecord.media/california-city-turns-off-flock-cameras-unauthorized-sharing
-
Idis Surveillance Management Software Vulnerable to Hacking
Web-Based Client on Local Host Didn’t Sanitize Inputs. Video camera surveillance management software made by South Korean manufacturer Idis is susceptible to a one-click attack giving hackers the power to execute arbitrary code. The vulnerability allows an attacker to escalate beyond the browser sandbox and achieve code execution on the host. First seen on govinfosecurity.com…
-
Critical IDIS IP Camera Vulnerability Allows Full Computer Compromise with One-Click Exploit
Tags: cctv, cloud, computer, cyber, exploit, remote-code-execution, software, vulnerability, windowsA critical vulnerability in IDIS Cloud Manager (ICM) Viewer exposes organizations using IDIS IP cameras to one-click remote code execution (RCE), potentially allowing attackers to compromise Windows systems used to monitor video surveillance fully. IDIS, a South Koreabased global video surveillance vendor, offers an end-to-end ecosystem comprising IP cameras, NVRs, video management software, and a…
-
Judge dismisses case alleging use of Flock cameras in Virginia city is unconstitutional
Tags: cctvA Virginia federal judge ruled that the warrantless use of Flock automated license plate cameras in Norfolk, Virginia, is constitutional and dismissed a case seeking to eradicate them. First seen on therecord.media Jump to article: therecord.media/judge-dismisses-flock-case
-
Critical Vivotek Flaw Enables Remote Arbitrary Code Execution
Tags: ai, botnet, cctv, cve, cyber, flaw, injection, intelligence, iot, reverse-engineering, vulnerabilityAkamai’s Security Intelligence and Response Team (SIRT) uncovered a serious command injection vulnerability in legacy Vivotek IoT camera firmware. Tracked as CVE-2026-22755, the flaw lets remote attackers inject and run arbitrary code as root without authentication. Researchers used AI-driven reverse engineering to find it, confirming impact on dozens of older camera models. This boosts botnet…
-
Critical TP-Link VIGI camera flaw allowed remote takeover of surveillance systems
TP-Link fixed a critical flaw that exposed over 32 VIGI C and VIGI InSight camera models to remote hacking, with over 2,500 internet-exposed devices identified. TP-Link fixed a high-severity flaw, tracked as CVE-2026-0629 (CVSS score 8.7), affecting over 32 VIGI C and VIGI InSight camera models. The vulnerability lets attackers on a local network bypass…
-
Critical TP-Link VIGI camera flaw allowed remote takeover of surveillance systems
TP-Link fixed a critical flaw that exposed over 32 VIGI C and VIGI InSight camera models to remote hacking, with over 2,500 internet-exposed devices identified. TP-Link fixed a high-severity flaw, tracked as CVE-2026-0629 (CVSS score 8.7), affecting over 32 VIGI C and VIGI InSight camera models. The vulnerability lets attackers on a local network bypass…
-
Critical TP-Link VIGI camera flaw allowed remote takeover of surveillance systems
TP-Link fixed a critical flaw that exposed over 32 VIGI C and VIGI InSight camera models to remote hacking, with over 2,500 internet-exposed devices identified. TP-Link fixed a high-severity flaw, tracked as CVE-2026-0629 (CVSS score 8.7), affecting over 32 VIGI C and VIGI InSight camera models. The vulnerability lets attackers on a local network bypass…
-
Met claims success for permanent facial recognition in Croydon
Met Police boasts that its permanent deployment of live facial recognition cameras in Croydon has led to more than 100 arrests and prompted a double-digit reduction in local crime, ahead of an upcoming judicial review to assess the technology’s lawfulness First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637351/Met-claims-success-for-permanent-facial-recognition-in-Croydon
-
TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism
TP-Link hasdiscloseda high-severity authenticationbypass vulnerabilityaffecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification. The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state manipulation. The vulnerability (CVE-2026-0629) enables threat actors positioned on the samelocal area network(LAN) to gain…
-
Android Users Hit by Volume Button Bug Linked to Select to Speak
Google has confirmed a critical bug affecting Android devices where volume buttons malfunction when the Select to Speak accessibility feature is enabled. The issue causes volume keys to adjust accessibility volume rather than media volume. It prevents the camera from capturing photos when the volume buttons are pressed during photography. Users with Select to Speak…
-
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Rust offers evasion advantages: CloudSEK researchers said RustyWater was developed in Rust, which they said is increasingly used by malware authors for its memory safety features and cross-platform capabilities, according to the blog post. Other state-sponsored groups, including Russia’s Gossamer Bear and China-linked actors, have also deployed Rust-based malware in recent campaigns, according to security…
-
NDSS 2025 GhostShot: Manipulating The Image Of CCD Cameras With Electromagnetic Interference
Session 8B: Electromagnetic Attacks Authors, Creators & Presenters: Yanze Ren (Zhejiang University), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University) PAPER GhostShot: Manipulating The Image Of CCD Cameras With Electromagnetic Interference CCD cameras are critical in professional and scientific applications where high-quality image data are required, and…
-
Alleged scam kingpin Chen Zhi arrives in China after extradition from Cambodia
Chen founded multinational conglomerate Prince Group that US says is front for multibillion-dollar fraud operationChinese television has shown footage of the US-indicted tycoon Chen Zhi being escorted by armed police after his extradition to China from Cambodia, where authorities on Thursday ordered the liquidation of a bank he founded linked to a massive “scam centre”…
-
Alleged scam kingpin Chen Zhi arrives in China after extradition from Colombia
Chen founded multinational conglomerate Prince Group that US says is front for multibillion-dollar fraud operationChinese television has shown footage of the US-indicted tycoon Chen Zhi being escorted by armed police after his extradition to China from Cambodia, where authorities on Thursday ordered the liquidation of a bank he founded linked to a massive “scam centre”…
-
Alleged scam kingpin Chen Zhi arrives in China after extradition from Colombia
Chen founded multinational conglomerate Prince Group that US says is front for multibillion-dollar fraud operationChinese television has shown footage of the US-indicted tycoon Chen Zhi being escorted by armed police after his extradition to China from Cambodia, where authorities on Thursday ordered the liquidation of a bank he founded linked to a massive “scam centre”…
-
RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices
RondoDox hackers exploit the React2Shell flaw in Next.js to target 90,000+ devices, including routers, smart cameras, and small business websites. First seen on hackread.com Jump to article: hackread.com/rondodox-botnet-react2shell-hijack-unpatched-devices/
-
Flock Exposes Its AI-Enabled Surveillance Cameras
404 Media has the story: Unlike many of Flock’s cameras, which are designed to capture license plates as people drive by, Flock’s Condor cameras are pan-tilt-zoom (PTZ) cameras designed to record and track people, not vehicles. Condor cameras can be set to automatically zoom in on people’s faces as they walk through a parking lot,…
-
TDL 012 – The Architect of the Internet on the Future of Trust
Summary In this episode of The Defenders Log, Paul Mockapetris, the architect of DNS, discusses the evolving role of the Domain Name System from a simple directory to a sophisticated security tool. He posits that modern networking requires “making sure DNS doesn’t work when you don’t want it to,” comparing DNS filtering to essential services…
-
What if your face could say >>don’t record me<<? Researchers think it's possible
Phones, smart glasses, and other camera-equipped devices capture scenes that include people who never agreed to be recorded. A newly published study examines what it would … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/24/blindspot-camera-devices-privacy-control/
-
NDSS 2025 A Large-Scale Measurement Study Of The PROXY Protocol And Its Security Implications
Tags: access, automation, cctv, conference, control, data, email, Internet, iot, leak, monitoring, network, service, vulnerabilitySession 7A: Network Security 2 Authors, Creators & Presenters: Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara) PAPER A Large-Scale Measurement Study Of The PROXY Protocol And Its Security Implications Reverse proxy servers play a critical role in optimizing Internet services, offering…
-
Why Smart Glasses in Hospitals Are Not a Bright Idea
Smart eyewear such as Meta-AI Ray Ban glasses – which sport microphones, cameras and can connect to artificial intelligence – pose emerging patient privacy and other risks especially when worn in healthcare settings, said Garrett Zickgraf of consulting firm LBMC. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/smart-glasses-in-hospitals-are-bright-idea-i-5509
-
NDSS 2025 PowerRadio: Manipulate Sensor Measurement Via Power GND Radiation
Session 6C: Sensor Attacks Authors, Creators & Presenters: Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang (Zhejiang University), Chenren Xu (Peking University), Wenyuan Xu (Zhejiang University) PAPER NDSS 2025 – PowerRadio: Manipulate Sensor Measurement Via Power GND Radiation Sensors are key components to enable various applications, e.g., home intrusion…
-
NDSS 2025 PowerRadio: Manipulate Sensor Measurement Via Power GND Radiation
Session 6C: Sensor Attacks Authors, Creators & Presenters: Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang (Zhejiang University), Chenren Xu (Peking University), Wenyuan Xu (Zhejiang University) PAPER NDSS 2025 – PowerRadio: Manipulate Sensor Measurement Via Power GND Radiation Sensors are key components to enable various applications, e.g., home intrusion…
-
New ‘DroidLock’ Android Malware Locks Users Out, Spies via Front Camera
Zimperium zLabs reveals DroidLock, a new Android malware acting like ransomware that can hijack Android devices, steal credentials via phishing, and stream your screen via VNC. First seen on hackread.com Jump to article: hackread.com/droidlock-android-malware-users-spy-camera/
-
Lawmaker calls facial recognition on doorbell cameras a ‘privacy nightmare’
Sen. Ed Markey (D-MA) asked Ring in October about its privacy policies and how it intends to protect individuals recorded by its new facial recognition technology feature called Familiar Faces. First seen on therecord.media Jump to article: therecord.media/lawmaker-calls-facial-recognition-doorbell-cameras-privacy-nightmare
-
Flock cameras remained active in two cities where officials had asked for them to be turned off
Officials in Cambridge, Massachusetts, and Eugene, Oregon, found that some Flock Safety license plate readers were still active after the municipalities asked for services to be terminated. First seen on therecord.media Jump to article: therecord.media/flock-safety-cameras-remained-active-after-cities-asked-turned-off

