{"id":2381,"date":"2016-07-25T15:08:24","date_gmt":"2016-07-25T20:08:24","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=2381"},"modified":"2016-08-08T17:28:44","modified_gmt":"2016-08-08T22:28:44","slug":"can-hackers-access-phones-camera-microphone","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/can-hackers-access-phones-camera-microphone\/","title":{"rendered":"Can Hackers Access Your Phone\u2019s Camera and Microphone?"},"content":{"rendered":"<p>We trust our phones to do everything for us: hold our bank and credit card information, recognize our voices and transcribe our speech, capture photos of us on vacation, and communicate with friends and work colleagues, et cetera. It\u2019s natural to worry about all of this information being stolen.<\/p>\n<p>Not long ago, Edward Snowden proved that the NSA has the ability to break into your phone\u2019s camera or microphone \u2014 even when it is turned off \u2014 and photograph the user, or record his or her conversations. What the NSA can do, a hacker can do. Exactly how likely is our phone to be susceptible to recording or photographing us while we\u2019re unaware?<\/p>\n<p>It depends. There are many ways that the security of our phone can be in jeopardy. You might already be familiar with unknown e-mail contacts sending malicious links with the intent of compromising your device; this method also applies to unknown phone numbers texting links or blank messages. Also be aware of strange links sent by e-mail addresses or phone numbers you do know \u2014 their device or e-mail could have been hacked. If you\u2019re unsure about a link or message\u2019s validity, ask your contact if it was intentional.<\/p>\n<p>More recently, many Android viruses, like the \u201cStagefright\u201d bugs, use messaging applications to infect the device by sending a MMS message \u2014 such as a video, or a link to a video \u2014\u00a0 that is automatically accepted by your device. These viruses are known for taking control of your device within seconds, which can lead to stolen personal information and spying.<\/p>\n<p>One way to prevent this from happening is to turn off automatic retrieval of MMS messages. Further, be cautious of third-party applications that request access to your camera or microphone: Do they need either in order to work properly? Hackers often insert malicious code into more popular, trusted apps as well \u2014 so you might not even be aware of any malware until it\u2019s too late.<\/p>\n<p>If your phone has been hacked, and you\u2019re able to, download PSafe\u2019s antivirus software. If not, you can perform a factory reset, which will wipe the virus from the device. However, there are still some precautions you can take, such as:<\/p>\n<ul>\n<li>Make sure your phone is receiving the latest security updates.<\/li>\n<li>Download anti-virus software, like PSafe Total, to quickly eliminate security threats and protect your device 24\/7.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Unless you\u2019re Mark Zuckerberg or in charge of the FBI, you\u2019re probably not at risk. But it\u2019s easier than you might think for your device to be hacked.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[1362,259,545,249,161],"class_list":["post-2381","post","type-post","status-publish","format-standard","hentry","category-security","tag-cybersecurity","tag-hackers","tag-safety","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/2381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=2381"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/2381\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=2381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=2381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=2381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}