10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

How to keep your smart cam footage safe and private


If you’re shopping around for a baby monitor, a pet camera, or a video doorbell, just a little research can make the world of network security cameras feel insecure. You don’t have to look far to find examples of companies breaking the trust of their customers. 

Wyze cameras and other smart cams from major companies have had vulnerabilities that could make potential users nervous.
Image: Wyze

And even if you trust that a company is going to be a good steward of your private data, you’ll likely have to pay for it. Companies like Ring and Arlo often raise prices for their subscriptions and, in some cases, remove features you’ve already paid for.  

In addition to the basic issues of security, some of the technology behind these cameras has potential drawbacks. First, relying on Wi-Fi alone can be potentially spotty and risky. Many of the cameras, particularly the outdoor ones, rely on battery technology that gives them a relatively long life on a single charge — but at the expense of not running 24/7 by default. 

What’s more, AI detection varies wildly in quality and accuracy from model to model. And very few of the cameras I tested for this article could be activated and managed without downloading another tedious app. I feel very strongly that every single IP camera should be mandated by law to not require an app. You should be able to connect them to your network or put them in hotspot mode and then do the entire process via a web browser. (And if I am forced to sign up for an additional brand-only account, I am going to lose it.)

So despite security cams being part of a massive industry peddling a relatively straightforward product, navigating the issues involved in safely purchasing and using one can feel like a chore. Where do you even start? 

Well, you can start by choosing safe ways to collect and store your video footage. In this article, I’m not going to talk about which camera to buy or how to install it — instead, I’m going to look at some of the more reasonable, flexible options out there that you can use to keep your video feed safe and private, from simplest to most complex.  

Safe and simple: Apple’s HomeKit Secure Video 

I generally do not trust most companies with my personal data, but of the bigger companies out there, Apple tends to be the least egregious in terms of basic security for smart home applications. If you aren’t the kind of weirdo who enjoys building a server or screwing around with homelab stuff, you could do far worse than a HomePod Mini or an Apple TV as the brain that’s running your smart home, especially if you use an iPhone on a daily basis. 

One of the nice little perks of this ecosystem is HomeKit Secure Video, Apple’s proprietary method for streaming from cameras. HomeKit Secure Video does, however, come with some caveats. You do need to be part of the Apple ecosystem, including an iCloud subscription. It isn’t perfect and has many limitations, but if your No. 1 priority is security, then you could do far worse. And hey — it means you don’t have to download a separate app from the camera manufacturer. 

Stay in-camera: save to an SD card

One nice thing about a lot of these cameras is that they allow you to save to a microSD card. MicroSD cards that hold a huge amount of data are dirt cheap now, and these cameras all run pretty efficiently. I was able to pull saved videos from most of them directly to my phone. 

One camera I tested, the EufyCam 3C with the HomeBase 3, allows a thumb drive to be connected to it to offload footage of triggered events. Another, the Tapo C420S2, actually comes with a little baby hub that will hold a microSD card with up to 256GB. 

The HomeBase 3 from Eufy allows a thumb drive to be connected to offload video footage.
Photo: Eufy

In short, for most people, keeping these devices running with a local SD card instead of opting for cloud services can be more than enough. 

Now, let’s get into the more complicated stuff.

Keep it in-house: run your own NAS

I love my NAS (Network Attached Storage) and think a lot more people should have one. If you don’t know what it is, it’s basically a baby server you shove hard drives into and attach to your router. 

There’s tons of stuff you can do with one. You can use it to store movies, have it function as a Jellyfin (or Plex, if that’s your thing) server, or stream your music and then access it anywhere. If someone I know needs a file on my server, I can just send them a link from my phone. You can also use a NAS solution to record footage from your security cameras. And when it comes to encryption, it can be very secure. 

While a NAS solution can be a hassle to get going, it’s less of a pain than other methods. When I was in the market, I went with Synology, and while it’s not the most open platform, it is one of the most robust off-the-shelf options. Synology’s security software, Surveillance Station, is considered one of the better pieces of software you can get when it comes to monitoring your home. (I have also seen people recommend Blue Iris). Synology’s Surveillance Station is also compatible with a whole slew of cameras. On top of that, Synology offers cloud backups as well (per camera, for a price). 

Again setting up a NAS solution is no minor task for a lot of people, but in general, Synology makes it easier than most. Alternatively, you can just buy an off-the-shelf dedicated network video recorder (NVR) — more on that in a moment. Meanwhile, in order to get my Synology NAS up and running, I first had to find some streams.

Add flexibility by adding a stream

In my opinion, the ability to have a stream makes your security system more transparent and flexible and also allows setting up an external DVR. Many cameras support common streaming protocols, the most common being RTSP and the ONVIF security standard. In general, cameras that can do this have far more utility. You can play an RTSP stream in VLC media player (one of the best free players available), and OBS can be configured to accept RTSP streams if you want to Twitch stream your house like it’s a reality TV show. 

Not all cameras come with this out of the box for various reasons. Many battery-run cameras, as previously mentioned, cannot stream continuously, which rules many of them out. And many smart cameras just don’t offer the feature, although Wyze (if you still trust it) has offered the option to use an alternate firmware that lets you use an RTSP stream. In general, though, several non-battery cameras from Amcrest, Reolink, Tapo, Hikvision, and Dahua allow for this. 

Of the cameras I tested for The Verge, some of the ones that allowed me easy access to an RTSP stream were the Eufy cameras connected to the HomeBase and a model by Lorex. With that stream, I was able to do a lot, like add it as a device in OBS. This allowed me to create something I call my “Bike Stream” setup in which I streamed myself watching to see if anything happened to my bike. Thankfully, nothing happened to my bike. But that’s just one of many opportunities that having ready and direct access to your technology affords you.

Configure to the max with a dedicated NVR

If I am being honest, I really don’t want my NAS to run as a network video recorder. That’s a fairly intensive task, and my NAS is already busy handling other stuff (like streaming FLACs so I can have ready access to all the DVDs I ripped). And while I am glad that I have Surveillance Station set up, I would prefer I have a piece of hardware dedicated to the task. Plus, I really wanted to see how far into the deep end I could go. 

I really wanted to see how far into the deep end I could go

For that, Scrypted and Frigate are what I am interested in. Frigate is a free, open-source NVR with a fantastic Home Assistant integration that lets you really unlock the potential of what you can do with your camera system. Scrypted is an open-source plug-in and has support for HomeKit Secure Video, even letting you use it for non-HomeKit Secure Video cameras. I already had HACS (Home Assistant Community Store) running, so getting Scrypted up and running wasn’t too hard.

Both pieces of software are infinitely configurable. And unlike other software like Blue Iris, you don’t pay fees to use Frigate, although you can get custom AI models with Frigate Plus to support the development of the platform. Scrypted NVR and its desktop client, on the other hand, are for paying subscribers, but there’s still a ton of stuff you can do with the software without paying. 

You can run either of them on a Mini PC or a NUC with something like an Intel N100 processor. Both can also run in a Docker container. Both can also be paired with Google’s cheap Coral accelerator, which has an Edge TPU on board, in either a USB or M.2 form factor, for hardware acceleration of machine learning, massively lowering the hardware load for object and facial detection.

You can also do tremendously interesting stuff with Scrypted and Frigate. For example, Frigate can use any ONVIF camera with PTZ (pan, tilt, and zoom) to automatically track objects, and you can use OpenVino, a deep learning model from Intel. Got a camera pointed at your bird feeder? Frigate lets you do the integration “Who’s At My Feeder?” to identify specific bird species, or you can try its “someone is parking in my driveway” feature. Not to be the open-source software guy, but the actual possibilities here are extensive and truly exciting.

How deep can — or should — you go?

If you are really paranoid about your devices potentially phoning home, there are a lot of ways to prevent them from doing that. You can put your cameras on a VLAN to isolate them or set your cameras to have static IP addresses and block them from accessing the outside world. This is a good practice but starts getting into deeper territory than the average person has the energy for. As with most things involving security, the question is: how deep do you really want to go? 

The world of security cameras is confusing by design, but in an ideal world, it doesn’t have to be. I want a world where these devices are more transparent by design and more secure, with fewer apps that clutter up my homescreen. I want a device that does not phone call external servers, with encrypted video as a basic standard that lets me configure it however I want and actually have some real fun for a change.





Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …