A drawing of a man wearing a hat with red eyes.

I've Been Hacked

Certified Network & Cyber Security Engineers

It looks like a plain pink background with a gradient.

Camera Systems

A white background with a few lines on it

I've Been Hacked is the most trusted Network & Security company on the coast. We have over 30 years experience in all things IT, serving major corporations such as Dreamworld & Newscorp Australia, as well as 5000+ general clients.

Is Your Camera System Secure?

Getting a camera system these days is very simple with a huge range available at most tech suppliers. However, despite their varying playback quality, there is commonality when it comes to the security of the camera system itself. The majority have a number of vulnerabilities that could lead to the complete opposite effect. You could become the one that is monitored.

Why Have Cameras?

For the average person, a camera may simply be setup as a deterrent, or to keep an eye on your driveway. This is great & most cameras will cover this purpose. However, in a number of vulnerable situations where there may be an ex partner or a targeted attack involved, it is critical to have a very secure camera system.


A personalised camera system for your home is the ultimate defence & evidence capture mechanism. When these systems run 24/7, there is not a chance that you will ever miss someone entering your premises. Especially if you suspect there may be an element of tampering with your devices or installing monitoring devices/bugs. For the persistent attacker, they will not be able to breach the system. So you will either end up in one of 2 scenarios. You will have 100% assurance that your home is safe or you will have undeniable evidence of breach for legal proceedings.

What Can Happen With An Insecure Camera System?

There are a number of ways that a hacker can exploit weaknesses in camera systems in order to take control of them for their own malicious purposes.


Deauth Attack: Wifi based cameras or smart doorbells often use very basic authentication protocols like WPA2 or earlier, meaning they are vulnerable to deauth attacks. This can be simply completed by sending deauth packets to a camera until it is booted off the network. This can cut the feed allowing intruders to invade you without notice or evidence. It can also be used to attempt to breach the network itself for further control over the system.


Hacking the Network: Hackers can exploit a network a number of ways in order to gain access. This opens pathways to Administration Controls of the Camera's & recording unit. For experienced hackers, they may be able to identify the systems used & hack them with a known exploit, brute force attack or common default password. This would give them full accessibility to view & control the camera system & perhaps even erase footage.


Account/App Exploits: A lot of common camera systems today have apps dedicated for providing a tunnelled connection between your phone, a 3rd party server & your camera system. The concern here is that, you have to put your faith in their systems & their security. With the number of times large corporations get hacked in the modern day, it is never worth the risk to run camera systems that use online applications.

Personalised Camera Quotes

We are all about implementing proactive security measures. So we take the time to do a free assessment of your home to determine points of entry, blind spots & assets of importance when deciding on the appropriate requirements for surveillance.


We can also talk about your personal needs out of a camera system. Do you need redundant recording? Do you need AI object recognition? Do you need a deterrent system? Would you like a covert system to capture evidence?


Our recommendations come from immense experience setting these systems up for Dreamworld, Newscorp, the Brisbane bypass tunnel & more. Get a personalised evaluation & quote today!

Some Of Our Customer Testimonies

Frequently Asked Computer Questions

  • Are Your Camera Systems Safe From Hackers?

    Absolutely! All of our camera systems are designed to not only capture continuous footage, but also use preventative technologies to stop common attacks from being applicable.

     

  • Are Your Cameras Cabled Or Wifi?

    For security purposes, we always choose to cable our cameras. That way exploits such as deauth on WIFI is not possible. Paired with a secure central router & a strategic port configuration, your camera security can be as potent as possible.

  • Is There Training Available For Cyber Security?

    What is a deterrent camera?

Find Our Office

We are located in the heart of Southport at the address 15 Welch St, shop 8, Southport.

Share by: