{"id":57250,"date":"2016-09-19T14:50:01","date_gmt":"2016-09-19T21:50:01","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=57250"},"modified":"2024-04-25T13:37:00","modified_gmt":"2024-04-25T20:37:00","slug":"your-macs-camera-can-be-hacked","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/","title":{"rendered":"Your Mac&#8217;s Camera Can Be Hacked"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-article.jpg\"><img loading=\"lazy\" class=\" size-full wp-image-57268 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-article.jpg\" alt=\"mac-webcam-spyware-article\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-article.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-article-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-article-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><em>Related:\u00a0<strong><a class=\"row-title\" href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Porn Blackmail Scam Rattles Mac Users: What You Need to Know<\/a><\/strong><\/em><\/p>\n<p>You might be asking, &#8220;Is my Mac&#8217;s camera hacked?&#8221; The truth is your webcam can be accessed without your consent, and therefore covering your Mac&#8217;s built-in camera is a good idea.\u00a0Don&#8217;t take my word for it,\u00a0just see what FBI Director James Comey has to say about it:<\/p>\n<blockquote><p>There\u2019s some sensible things you should be doing, and that\u2019s one of them,\u201d Comey said regarding webcam covers.\u00a0\u201cYou go into any government office and we all have the little camera things that sit on top of the screen.\u00a0They all have a little lid that closes down on them.\u00a0You do that so that people who don\u2019t have authority don\u2019t look at you. I think that\u2019s a good thing.&#8221;<\/p><\/blockquote>\n<p>He said this while <a href=\"https:\/\/www.digitaltrends.com\/computing\/fbi-director-cover-your-webcam\/\" target=\"_blank\" rel=\"nofollow noopener\">speaking at a conference<\/a>.\u00a0Looks like <a href=\"https:\/\/9to5mac.com\/2016\/06\/21\/facebook-mark-zuckerberg-tape-over-camera\/\" target=\"_blank\" rel=\"nofollow noopener\">Mark Zuckerberg had the right idea<\/a>.<\/p>\n<p>But come on, no-one is spying on little old me, right? Are you confident you&#8217;d be able to tell if your Mac&#8217;s camera was hacked?<\/p>\n<p>Anyone who\u00a0uses the built-in iSight camera in their iMac or a\u00a0MacBook knows the little green light will turn on when the camera is in use. However, not only has this indicator light been <a href=\"https:\/\/jscholarship.library.jhu.edu\/items\/c0882cf8-6bce-4625-b83e-8acd9e9f59cf\" target=\"_blank\" rel=\"nofollow noopener\">disabled successfully in the past<\/a>, you really won&#8217;t notice the light turning on for a fraction of a second while a picture is being taken. Hardware is now fast enough to activate the camera, take a picture, and then turn off the camera again in the time it takes you to blink. Even if current spyware is unable to disable the light, chances are you won&#8217;t see it when it does come on.<\/p>\n<h3>Covering the webcam on your computer is a good idea<\/h3>\n<p>We don&#8217;t even need to go that far back in time to see an example of <a href=\"https:\/\/securelist.com\/the-missing-piece-sophisticated-os-x-backdoor-discovered\/75990\/\" target=\"_blank\" rel=\"nofollow noopener\">malware that has the ability to use your webcam against you<\/a>, amongst other things. Then there was\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\" target=\"_blank\" rel=\"noopener\">the Eleanor malware\u00a0<\/a>shortly before that, and just to demonstrate this is not a new idea, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/blackhole-rat-evolves-again-new-variant-found\/\" target=\"_blank\" rel=\"noopener\">here&#8217;s another one, called BlackHole RAT<\/a>, from a while back. Let&#8217;s not forget well-funded nation states that use some pretty darn sophisticated tricks to get what they want as well. One example is the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/emergency-ios-9-3-5-update-thwarts-pegasus-spyware-patch-now\/\" target=\"_blank\" rel=\"noopener\">Trident exploit<\/a> that was discovered on iOS, which could have just as well been unleashed on OS X before\u00a0Apple <a href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-el-capitan-yosemite-security-updates-patch-trident-flaws-2\/\" target=\"_blank\" rel=\"noopener\">patched the exact same vulnerabilities<\/a> there about\u00a0a week later.<\/p>\n<p>Your webcam can be accessed without your consent, and there is malware out there that makes it happen on a somewhat regular basis. Some we know of, most we probably don&#8217;t know of. So what can you do? Cover your webcam, silly!<\/p>\n<p>This can be as simple as a sticky note on the camera or, if you want it to match the color of your bezel, some electrical tape. The solution depends on how often you use your camera.<\/p>\n<p>Personally, I never use the camera on my MacBook Pro, so for me some electrical tape does the job. It sits flush, matches the color of my display bezel and I hardly even notice it&#8217;s there. My wife, who uses FaceTime often on her iMac, found a <a href=\"https:\/\/www.amazon.com\/s?k=sliding+webcam+cover\" target=\"_blank\" rel=\"nofollow noopener\">sliding webcam cover<\/a> that gets the job done and doesn&#8217;t look half bad. For laptops, just make sure the solution is thin enough to allow\u00a0the lid close properly and not scratch the aluminum.\u00a0Closing the lid on your laptop is another solid way to make sure nothing can be seen through your webcam. \ud83d\ude09<\/p>\n<div id=\"attachment_57349\" style=\"width: 980px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-on-covered.jpg\"><img aria-describedby=\"caption-attachment-57349\" loading=\"lazy\" class=\"wp-image-57349 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-on-covered.jpg\" alt=\"\" width=\"970\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-on-covered.jpg 970w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-on-covered-150x39.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-on-covered-300x77.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-on-covered-657x169.jpg 657w\" sizes=\"(max-width: 970px) 100vw, 970px\" \/><\/a><p id=\"caption-attachment-57349\" class=\"wp-caption-text\">There is no right or wrong way, just the way that works for you.<\/p><\/div>\n<p>How about the microphone? Malware that accesses your webcam also uses the microphone to capture sound.\u00a0A quick test showed that a piece of electrical tape over the microphone muffles or blocks sounds just enough so that normal conversation cannot be picked up. It is not possible to completely mute\u00a0the microphone, unfortunately, as it will always pick up some sounds.<\/p>\n<p>On older laptops, the microphone can be found on the side of the body and on iMacs the microphone sits on the top of the bezel right above the camera. The Mac Pro and Mac mini don&#8217;t have built-in microphones. Covering the microphones in newer MacBook Pro&#8217;s can become\u00a0tricky as they are inside the speaker grill. Covering the microphones would mean losing a speaker, which is a sacrifice I doubt anyone would make.<\/p>\n<p>If defacing your Mac is simply not an option, exercise\u00a0common sense when browsing\u00a0the web or\u00a0downloading files, and use a good <a href=\"https:\/\/www.intego.com\/buynow\" target=\"_blank\" rel=\"noopener\">antivirus and firewall<\/a>. Keeping malware from even being installed on your Mac is, of course, the best remedy\u00a0\u2014 but this is not always possible. This is where an antivirus will hopefully detect any malware that does make it on to your Mac. For good measure, a two-way firewall with outbound data protection will alert you if anything attempts to make an outgoing connection (upload a webcam snapshot to an off-site server, for example).\u00a0A good combo-package that includes an award-winning antivirus and firewall is Intego&#8217;s <a href=\"https:\/\/www.intego.com\/buynow\">Mac Internet Security X9<\/a> bundle.<\/p>\n<h3>Related stories<\/h3>\n<p>But perhaps you came here because you got an e-mail claiming that you were caught viewing pornography\u2014maybe even pedophilia\u2014and perhaps the sender claims to have a video of you in the act. Could this really be true?<\/p>\n<p>Chances are, the claims are false; this is a very common scam because it preys on victims&#8217; fears. Be sure to check out these related articles and video for more details:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"1r9y5zEG0L\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\">Porn Blackmail Scam Rattles Mac Users: What You Need to Know<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Porn Blackmail Scam Rattles Mac Users: What You Need to Know&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/embed\/#?secret=1r9y5zEG0L\" data-secret=\"1r9y5zEG0L\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Etv7RpN9tD\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/\">CIA porn accusation emails: Here&#8217;s what Mac users need to know<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CIA porn accusation emails: Here&#8217;s what Mac users need to know&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/embed\/#?secret=Etv7RpN9tD\" data-secret=\"Etv7RpN9tD\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/V4GXOhBlcAg?rel=0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Related:\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, &#8220;Is my Mac&#8217;s camera hacked?&#8221; The truth is your webcam can be accessed without your consent, and therefore covering your Mac&#8217;s built-in camera is a good idea.\u00a0Don&#8217;t take my word for it,\u00a0just see what FBI Director James Comey has to [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":57265,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3115,4264,4732,125,3118],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Related:\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, &quot;Is my Mac&#039;s camera hacked?&quot; The truth is your webcam can be\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Mac&#039;s Camera Can Be Hacked - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Related:\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, &quot;Is my Mac&#039;s camera hacked?&quot; The truth is your webcam can be\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-19T21:50:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T20:37:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\",\"name\":\"Your Mac's Camera Can Be Hacked - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#primaryimage\"},\"datePublished\":\"2016-09-19T21:50:01+00:00\",\"dateModified\":\"2024-04-25T20:37:00+00:00\",\"description\":\"Related:\\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, \\\"Is my Mac's camera hacked?\\\" The truth is your webcam can be\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Mac&#8217;s Camera Can Be Hacked\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Your Mac&#8217;s Camera Can Be Hacked\",\"datePublished\":\"2016-09-19T21:50:01+00:00\",\"dateModified\":\"2024-04-25T20:37:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#webpage\"},\"wordCount\":1041,\"commentCount\":9,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg\",\"keywords\":[\"iSight\",\"Porn Blackmail\",\"Sextortion\",\"Spyware\",\"Webcam\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Related:\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, \"Is my Mac's camera hacked?\" The truth is your webcam can be","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/","og_locale":"en_US","og_type":"article","og_title":"Your Mac's Camera Can Be Hacked - The Mac Security Blog","og_description":"Related:\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, \"Is my Mac's camera hacked?\" The truth is your webcam can be","og_url":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-09-19T21:50:01+00:00","article_modified_time":"2024-04-25T20:37:00+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/","name":"Your Mac's Camera Can Be Hacked - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#primaryimage"},"datePublished":"2016-09-19T21:50:01+00:00","dateModified":"2024-04-25T20:37:00+00:00","description":"Related:\u00a0Porn Blackmail Scam Rattles Mac Users: What You Need to Know You might be asking, \"Is my Mac's camera hacked?\" The truth is your webcam can be","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Your Mac&#8217;s Camera Can Be Hacked"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Your Mac&#8217;s Camera Can Be Hacked","datePublished":"2016-09-19T21:50:01+00:00","dateModified":"2024-04-25T20:37:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#webpage"},"wordCount":1041,"commentCount":9,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg","keywords":["iSight","Porn Blackmail","Sextortion","Spyware","Webcam"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/09\/mac-webcam-spyware-featured.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-eTo","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57250"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=57250"}],"version-history":[{"count":37,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57250\/revisions"}],"predecessor-version":[{"id":100355,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/57250\/revisions\/100355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/57265"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=57250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=57250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=57250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}