Consumer

All Products and Services

More One Stop Solution

Support

Identity Loc

SafeCam: Webcam Security

Helps to secure your PC webcam

against unauthorized access.

SafeCam alerts you to attempts to access your Windows PC webcam and gives you the option to block those who are not authorized to access it.

about

What is SafeCam
from One Stop Solution?

SafeCam helps keep hackers from gaining unauthorized access to a user’s webcam on Windows PCs.

The webcam on your PC is a great way to keep in touch with family, or friends or colleagues. But it can also be vulnerable to hacking. With SafeCam, you’ll get notified when cybercriminals try to use your webcam, so we can help you block them. SafeCam monitors software and users requesting access to your webcam and gives you the option to allow or block webcam use.5

Responsive image

Is it possible to hack a webcam?

Short answer, Yes

Webcam hacking, sometimes called “camfecting,” is when a cybercriminal uses types of malware that enable them to remotely access a webcam, typically without the computer user’s knowledge. Inadvertently installing a Trojan, such as by clicking a link or downloading a file that leads to a Trojan infection, is a common way for this to happen.

Slide 2

Do you really need to cover your webcam?

Webcam protection is a common-sense security precaution

A former head of the FBI publicly recommended covering your webcam, calling it a sensible thing to do.1

More than a webcam cover, SafeCam is a feature that detects attempts to access your Windows PC webcam and lets you block unauthorized access.⁵ As part of Norton 360, SafeCam is one of many features of Norton technology to help protect against this threat.

How do webcams get hacked?

Like many types of software, the same type of tool can be used to help or to harm.

RAT: Remote Access Tool or Trojan? RAT can be an abbreviation for any of the following:

  • Remote Access (or Administration) Tool
  • Remote Access (or Administration) Trojan

The difference between tools and Trojans is that tools are often used to help, while Trojans are used for malicious purposes. A remote access tool can be used for legitimate reasons, such as for remote technical support. Unfortunately, some of the useful features that enable you to get computer help from home are also used in malicious Trojans, and often without the computer user’s knowledge.

Remote access Trojans are good at hiding their presence on a computer, so a victim may not even know it has been installed. Using the Trojan, a cybercriminal can do almost anything that someone physically sitting at the computer can do, including recording footage using the webcam. These types of Trojans are sometimes called “creepware.”

AntiVirus Plus Image

How do computers get infected with Trojans?

How would a cybercriminal infect your computer with a Trojan or “creepware”?

Remote access Trojans (RATs), or what we might call “creepware,” are programs that are installed without the victim’s knowledge and allow a cybercriminal to have access and control of the compromised computer from a remote location. Often, the cybercriminal will trick a victim into installing a Trojan, through clicking on a malicious link or downloading a malicious email attachment.

Ways your computer could get infected include:

Drive-by downloads

By visiting a website, the user unknowingly downloads a Trojan onto their computer. This is called a drive-by download.

Malicious links

Malicious links, leading to websites hosting drive-by downloads, are distributed using social media, chat rooms, message boards, spam email, etc. The cybercriminal may also hack user accounts to make it seem like the link is being sent by a friend. Others may try to lure victims by posting enticing messages.

Exploit kits

Potential victims may visit compromised websites or click on malicious links and are then redirected to the exploit kit’s server where a script runs that will determine what exploits can be leveraged. If an exploit is viable, the victim is infected with the “creepware” and the cybercriminal is notified.

Packaged with other downloads

A Trojan can be spread through being packaged with other software or apps, such as with freeware that you might download from a website, app store, or through peer-to-peer file-sharing/torrents. Once you open and run the program, the Trojan could install with or without your knowledge too.

Once the Trojan gets on a device, the hacker can see what you do online, capture your keystrokes such as when you type a username and password (keylogging), and could take full control of your computer, including your webcam.

The multi-layered protection in Norton 360 helps protect your computer against these cyberthreats. Even if you do inadvertently click on a bad email attachment, a link to a malicious website, or download something that has malware inside, Norton protection has many ways to identify, quarantine, and remove the threat to help your PC stay malware-free.

Laptop



How does Norton protection help against webcam hacking?

By using a multi-layered defense

Norton 360 uses multiple different protection technologies working together to help defend against malware, including the types of malware that can lead to webcam hacking. The best way to protect your PC against this threat is to help protect it against malware, and that’s exactly what Norton proteption does.

Icon

Intrusion Prevention System (IPS)

Analyzes information arriving from a network (like the Internet) and helps block potential online threats before they hit your computer.

Icon

AntiVirus with Advanced Machine Learning

Scans and helps remove malware files that enter a device, using emulation to test and see what files do, and machine learning.

Icon

Reputation Protection (Insight)

Uses the reputation information gathered from our global network to classify software application files on their attributes.


Icon

Behavioral Protection

Uses artificial intelligence to classify applications based on behavior, and automatically helps block applications that display suspicious behavior.



Icon

Proactive Exploit Protection (PEP)

Helps protect against ‘zero-day’ attacks that exploit vulnerabilities in applications or the operating system.


Icon

Power Eraser

Helps detect and lets you remove high-risk applications and malware that may be residing on your computer..

Working together, these powerful layers of Norton technology help protect your PC against malware of various kinds, and specifically the types of malware that can lead to webcam hacking.

about

What is SafeCam
from One Stop Solution?

SafeCam helps keep hackers from gaining unauthorized access to a user’s webcam on Windows PCs.

The webcam on your PC is a great way to keep in touch with family, or friends or colleagues. But it can also be vulnerable to hacking. With SafeCam, you’ll get notified when cybercriminals try to use your webcam, so we can help you block them. SafeCam monitors software and users requesting access to your webcam and gives you the option to allow or block webcam use.5

One Stop Solution Safe Web feature:

Protection against phishing and scam sites

Is your browser making a loud noise telling you that your machine is infected and you must call a toll-free number to fix the security issue?

Is a site telling you that you must log in to confirm your recent credit card transactions?

You may be about to give away your login credentials or credit card PIN number to cybercriminals, also known as getting “phished.”

Our scam protection in the Norton Safe Web browser extension gives you protection against fake tech support attacks.

about
about

What is SafeCam
from Norton?

SafeCam helps keep hackers from gaining unauthorized access to a user’s webcam on Windows PCs.

Your computer’s webcam is an excellent tool for connecting with loved ones, friends, or coworkers. However, it can also pose security risks if targeted by hackers. With SecureLens, you’ll receive alerts whenever unauthorized users attempt to access your webcam, allowing you to take action against potential threats. SecureLens keeps an eye on applications and individuals seeking permission to use your camera, empowering you to approve or deny access as you see fit.

SafeCam is available in Norton 360 plans