How to Protect Yourself from Camera and Microphone Hacking

How to Protect Yourself from Camera and Microphone Hacking

According to a TechCrunch report, Apple once disabled the Walkie Talkie audio chat feature on its smartwatches to fix a vulnerability that could have allowed someone to listen in on users without their consent. Just days earlier, a security researcher found a similar flaw in the Zoom video conferencing app, which could be used to trick Mac users into opening a video call—even if they had previously deleted Zoom. Both Apple and Zoom released updates to address these issues.

There were no reports of consumers falling victim to these vulnerabilities, and security flaws involving connected cameras and microphones are nothing new. Still, the news adds to users’ concerns about digital privacy. According to a nationally representative survey of over 1,000 adults conducted by Consumer Reports in May, forty-three percent of Americans who own smartphones believe their device records what they say without their permission.

While targeted advertising can be so effective that it may seem like tech companies are illegally recording your conversations, privacy and security experts say this isn’t actually happening—marketers have other, highly effective ways to figure out what might interest people.

On the other hand, there is a real, albeit remote, risk that hackers could gain control over your devices’ cameras and microphones, according to security experts.

“These are risks we take with these smart devices,” says Patrick Jackson, Chief Technology Officer at Disconnect, a cybersecurity firm that partners with Consumer Reports on investigations. “They have a lot of sensors, and you don’t always know if they’re on or off.” However, Jackson says there are a few simple steps you can take to protect yourself, no matter what brand of computer or smartphone you use.

Avoid Specialized Video and Audio Chat Apps

“Every time you install a new app on your device, you’re adding another hole to your system with more potential software vulnerabilities that hackers could try to exploit,” says Cody Feng, project leader for security and privacy testing at Consumer Reports. “In digital security, we call this the ‘attack surface.’ Reducing this surface is always a good idea.”

Most apps, like Google Hangouts, Skype, and Zoom, let you make and receive calls by logging into their website in a web browser without downloading any special software. Using a browser instead of downloading an app is a simple way to stay a bit safer.

The web browser itself isn’t inherently more secure, but the fewer apps you have on your computer with access to your camera and microphone, the fewer opportunities you give hackers.

Check Your Device Permissions

All kinds of apps can request permission to access your camera, microphone, and other features like location information on your phone or computer. Using the steps below, it’s easy to see which apps have requested permission and to revoke permissions you’ve granted in the past.

“Make sure you know all the apps that have permissions to access video and microphone,” says Jackson from Disconnect.

Jackson recommends disabling any permissions that aren’t essential for your daily life. That way, even if an app is hacked, an attacker can’t directly connect to your camera or microphone without further hacking.

  • On Android phones: Open “Phone Settings” > “Apps” (or “Apps & Notifications”) > “Advanced” > “App Permissions” > “Camera.” Toggle the switch next to an app to revoke permission. Then go back and do the same in the “Microphone” menu. (These instructions may vary slightly depending on your phone model.)
  • On iPhone: Open “Phone Settings” > “Privacy” > “Camera.” Tap the switch next to an app to revoke permission. Then go back and do the same in the “Microphone” menu.
  • On Mac: Go to Computer Settings > Security & Privacy > Privacy > Camera. Uncheck the box next to an app to revoke permission. Then go back and do the same in the “Microphone” menu.
  • On PC: Open “Computer Settings” > “Privacy” > “Camera” > “Disable camera access,” or use the switches next to individual apps to adjust permissions. Then go back and do the same in the “Microphone” menu.

Update Your Software and Firmware

Updating your software and firmware is crucial for keeping your digital system secure. Sometimes, as with Apple Watch’s Walkie Talkie issue, manufacturers automatically release updates to keep consumers safe when serious flaws are discovered.

In other cases, like with the Zoom app, you may need to take extra steps to ensure your protection. According to Zoom, users can visit the Download Center on their website to check for updates, or open the app, click “zoom.us” in the top left corner, and select “Check for Updates.”

“Don’t wait until you hear about a problem to look for updates, and install security updates right away,” says Feng. Enable automatic updates or check for updates frequently.

The Tape Method

There’s a famous photo of Mark Zuckerberg with a laptop in the background, featuring a piece of tape covering the camera. Doing the same with your computer is one way to give yourself peace of mind. If tape looks too messy for you, you can buy stickers made for this purpose.

“This method is a great solution for video, but not for your microphone,” says Jackson. In fact, he says, built-in microphones are often designed to work even if they’re covered. “With a phone or laptop microphone, you often have to rely on software for protection,” Jackson says.

Still, you can try a so-called “microphone blocker”—essentially a plug with nothing on the other end that you insert into your device’s headphone or microphone jack. When it works as intended, the blocker tricks the device into thinking a microphone is connected and switches from the built-in mic to the external one, so a hacker won’t get a signal if they break into your system.

Microphone blockers are usually inexpensive, so if you’re really concerned about hacked microphones, consider this option. However, keep in mind that it doesn’t always work and isn’t compatible with all devices.

Author: Vladimir Bezmalyy

Leave a Reply