Camera security vulnerability allows hackers access to almost any camera

February 12, 2024 In a striking revelation, Northeastern University research has brought to light a severe lapse in the security of modern cameras, including those used in home security systems and smartphones. Here’s a breakdown of the crucial points from the research:

The study introduced EM Eye, a method that captures live video from cameras through walls by tapping into the electromagnetic radiation emitted by the camera’s internal wires. This vulnerability could allow someone with moderate technical skills and equipment to spy on camera feeds in real time.

The equipment required for this type of espionage is relatively inexpensive and accessible, meaning that with a small investment, the privacy of individuals and security of properties could be compromised.

A significant gap in camera design has been highlighted; while efforts are made to secure digital interfaces, little attention is given to prevent information leakage through unintended electromagnetic emissions.

The distance from which an individual can intercept camera feeds varies with different devices; some may require close proximity, while others can be accessed from up to 16 feet away.

Even when not recording, cameras with an open lens can transmit live feeds, posing a constant threat of surveillance through walls.

 

Sources include: TechXplore [].

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 4, 2026 Two Amazon Web Services data centres in the United Arab Emirates were “directly struck” by drones over more...

March 4, 2026 OpenAI is developing an internal code-hosting platform that could compete with Microsoft-owned GitHub, according to a report more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn