Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
7 Ways to Cover Your Device’s Camera

Uday Mittal July 17, 2016 Leave a Comment

7 Ways to Cover Your Device’s Camera

Have you ever wondered that somebody might be watching you through your laptop’s webcam or smartphone’s camera? Or that while your laptop or smartphone stays on, in your bedroom, somebody might be recording your each and every act? Cracking into device cameras has been around ever since they were commercialized. Most of the devices we […]

Filed Under: Awareness Tagged With: Cyber Security, hacking, privacy, smartphone camera, Webcam, Webcam cover

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress