In 2013, yet another cyber creep took over a baby monitor to spy on a 2-year-old Texas girl, to broadcast obscenities at the child, to swivel the camera so as to watch her shocked parents as they came in, and to then call the parents insulting names.
It’s not just baby monitors that are subject to getting hijacked, either.
Managing its cam program is a challenge for the zoo.
It has to decide which animals are interesting enough to warrant a 24/7 public cam and find the funds to keep up with ever-changing — and costly — technology. Over the years, as the technology behind some cams has become obsolete, the zoo hasn’t replaced it.
Local Texas news outlet KHOU reports that the nanny, Ashley Stanley, thought the 1-year-old girl’s parents were teasing her: The nanny’s employers were not, in fact, playing a joke.
Rather, the intruder had broken through the security of the family’s password-protected Wi-Fi and then been able to access the camera, which was not, unfortunately, protected by more than the default password.
Your comment was successfully submitted and will be published in accordance with site policy.
Well, there is no one size fits all solution – it depends on the individual circumstances and where you are in the world – but we’ve drawn up some scenarios that are typical of some of the crimes that any computer user, at home or work, might come across.
A friend had advised her to use a complex password for her personal webmail, but she finds it difficult to remember so she has it written down in her diary.
claimed to tap into the direct feeds of hundreds of thousands of private cameras secured with default passwords from 152 countries – including, for example, Thailand, Sudan, the Netherlands, the UK, the US, Bolivia, Korea, and China.
In the first of our series of articles on how to report a computer crime, we’ll look at unauthorised email access, what offences are committed when a crime like this happens and how you should report it. She logs into her personal webmail account during her lunch-break, which she is allowed to do according to her company’s computer policy.