Vulnerability in allows hackers to steal private pictures from digital cameras




The International Imaging Industry Association has devised a 'standardised protocol' known as  Picture Transfer Protocol  (PTP) to move digital pictures from camera to PC seeing as Modern Cameras which connect with a PC by means of USB or WiFi systems are said to have been vulnerable against ransomware and malware attacks.

A research report from Check Point Research ascribes the danger to Picture Transfer Protocol (PTP) used to transfer digital pictures from camera to PC.

For their research, Check Point utilized Canon's EOS 80D DSLR camera which supports both USB and WiFi, and basic vulnerabilities in the PTP were found. Given that the protocol is standardized and installed in other camera brands, it is reasonable for expect that comparable vulnerabilities can be found in cameras from different sellers too.

The transfer protocol was at first centered around picture transfer, but it evolved further to incorporate many various commands that support anything from taking a live picture to overhauling the camera's firmware.

Eyal Itkin, Security Researcher, Check Point Software Technologies says that, “Any ‘smart’ device, including the DSLR camera, is susceptible to attacks; cameras are no longer just connected to the USB, but to the WiFi network and its surrounding environment. This makes them more vulnerable to threats as attackers can inject ransomware into both the camera and PC it is connected to. The photos could end up being held hostage until the user pays the ransom for them to be released.”

Here are some important measures the camera owners can take in order to avoid being infected:

  • Ensure your camera is utilizing the most recent firmware version, and install a patch if available.
  • Turn off the camera's WiFi when not being used
  • When utilizing Wi-Fi, take a stab at utilizing the camera as the Wi-Fi___33 access point (basically, design the camera to go about as a Wi-Fi hotspot), instead of connecting your camera to an open Wi-Fi network.



The Rise of Fingerprinting and Monitoring Of Our Digital Activities




 The concept of digital privacy has evolved so much with time that regardless of whether we secure our data to ensure that we are not tracked on the web, the ad tech industry, through some way or different finds ways to monitor our digital activities.

Being alluded to as a cutting edge tracking technology by security researchers, the fingerprinting technology has for sure achieved new statures.

While it incorporates taking a look at the many characteristics of the user's mobile device or computer, like the screen resolution, operating system and model, it likewise very effectively while triangulating this data, pinpoints and follows the user as they browse the web and make use of the other apps.

Presently since the technique happens imperceptibly out of sight in applications and websites, it becomes very hard to block the particular technology at whatever point it isn't required.

In the course of the most recent couple of years, tech companies like Apple and Mozilla 'introduced aggressive privacy protections' in their internet browsers to make it harder for advertisers to follow the users around the web and serve targeted ads on promotions.

But since a large number of those technologies ended up getting blocked by default, the advertisers needed to come up with an alternate method to track more users.

That is when the fingerprinting technology becomes an integral factor, as it gathers apparently harmless attributes that are commonly shared as default to make applications and sites work appropriately, which happens when the users gives an application the consent to access their location data, their camera and microphone. Thus, many other browsers likewise require the permission before a website can access those sensors.

While some state that the fingerprint method can be dependable and reliable, others say that it is abusive on the grounds that in contrast to cookies, which the users can see and delete, one for the most part can't tell it is going on and can't opt out it.

Nonetheless the solutions for averting fingerprinting are generally new, and some are still being developed. Thus it is difficult to tell how powerful they are since fingerprinting happens undetectably. So here are a few solutions for blocking browser fingerprinting.
  1. Apple users can make use of the protections installed in the Safari browser for computers and mobile devices.
  2. Android users and Windows users can try the Firefox web browser.
  3. Furthermore, the other desktop browsers can easily install an add-on.

In case of mobile users:
Privacy Pro and Disconnect Premium can examine the application activities on the device to recognize and block trackers, including finger printers.

Since Fingerprinting is a perplexing subject since the tracking method applies to both the web and mobile applications it is thusly recommended for the users to become familiar with it and be one at least one step ahead in ensuring their privacy protection themselves.