Java Backend Technology
Java Backend Technology
Feb 6, 2022 · Information Security

How Camera Hacking Threatens Privacy and How to Protect Yourself

Recent incidents of illegal camera hacking—ranging from public surveillance footage posted on Bilibili to a livestreamed gynecological surgery—highlight severe privacy violations, prompting platform bans, police action, and expert advice on securing cameras against unauthorized access.

Bilibilicamera securityonline surveillance
0 likes · 5 min read
How Camera Hacking Threatens Privacy and How to Protect Yourself
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2019 · Information Security

How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control

A hacker recounts how a desperate request led to a full‑scale investigation of insecure IoT cameras, using Shodan to discover default credentials, reverse‑engineering a malicious Android app, infiltrating a cloud server, and ultimately dismantling a ransomware operation that harvested nude videos.

APK reverse engineeringIoT vulnerabilityRemote Access Trojan
0 likes · 10 min read
How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control