Camera security vulnerability allows hackers access to almost any camera

February 12, 2024 In a striking revelation, Northeastern University research has brought to light a severe lapse in the security of modern cameras, including those used in home security systems and smartphones. Here’s a breakdown of the crucial points from the research:

The study introduced EM Eye, a method that captures live video from cameras through walls by tapping into the electromagnetic radiation emitted by the camera’s internal wires. This vulnerability could allow someone with moderate technical skills and equipment to spy on camera feeds in real time.

The equipment required for this type of espionage is relatively inexpensive and accessible, meaning that with a small investment, the privacy of individuals and security of properties could be compromised.

A significant gap in camera design has been highlighted; while efforts are made to secure digital interfaces, little attention is given to prevent information leakage through unintended electromagnetic emissions.

The distance from which an individual can intercept camera feeds varies with different devices; some may require close proximity, while others can be accessed from up to 16 feet away.

Even when not recording, cameras with an open lens can transmit live feeds, posing a constant threat of surveillance through walls.

 

Sources include: TechXplore [].

Top Stories

Related Articles

December 23, 2025 Thank you. None of what follows happens without your support. Hashtag Trending has now passed three million more...

December 23, 2025 Editor's Notes: This is the first of two articles reflecting on the year but Yogi Schulz. Schulz' more...

December 23, 2025 Spotify says it has identified the user account behind what it describes as “unlawful” scraping of its more...

December 23, 2025 Waymo temporarily suspended its self-driving taxi service in San Francisco over the weekend after a citywide power more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn