A hacker took over the webcam of Miss Teen USA, another remotely spied on a baby via a wireless IP cam; such privacy concerns may have prompted Microsoft to flip-flop on requiring Xbox One to be plugged into Kinect. People who believe hijacking a webcam is mostly a tinfoil-hat theory should listen to the recently crowned Miss Teen USA. About four months ago, when California’s Cassidy Wolf “was just a normal girl in high school,” Facebook notified her that someone tried to “log into her account from another state.” The now 19-year-old beauty queen told Today:She then received an anonymous e-mail from a stranger saying he was in possession of photos of her that were taken in her bedroom via the webcam on her computer after it was hacked. The person tried to extort her in return for ensuring the photos were not made public. She cannot divulge all the specific details because the incident is now under federal investigation.“I wasn’t aware that somebody was watching me (on my webcam),” she said. “The light (on the camera) didn’t even go on, so I had no idea.”She intends to utilize her platform as Miss Teen USA to educate people about cybercrime and potentially help prevent others from being victimized too. It is a much-needed awareness campaign, considering that a study last year found one in two Americans are clueless about webcam hacking. WhiteHat Security’s Jeremiah Grossman has also tried to raise awareness about the danger of clickjacking, which can be used to exploit vulnerabilities such as in Adobe Flash to take over a webcam.The new Miss Teen USA’s “tips for protection against hackers include changing passwords frequently and making them unique by using symbols and different characters, deleting cookies and browsing history regularly, and putting a sticker over the computer’s webcam when you’re not using it.”Hacked wireless security camera used to spy on baby It’s not just beauty queens, but also babies who have become victims of remote voyeurs. After a hacker hijacked a wireless IP camera being used as a baby monitor by a Texas family, he spied on and yelled obscenities at a two-year-old in her crib. When her parents came into the room, the hacker remotely focused the camera on them and then cursed at them as well.Back in April, I covered a Hack in the Box presentation that demonstrated how to turn your wireless IP surveillance camera against you. Before that, we looked at how unpatched firmware in TRENDnet IP cameras allow voyeurs to spy in real-time into homes and offices. A full year after the company released firmware to patch the flaw, the vulnerability was still providing a Peeping Tom paradise for armchair surfers. Microsoft: Xbox One will function without plugging in KinectInitially, when Microsoft said the Xbox One had to be plugged into Kinect to function, it sparked similar worries about being spied on in the privacy of our homes. But after Microsoft’s Marc Whitten listed a variety of reasons you would want the Kinect always plugged in to Xbox One and hooked online, he told IGN, “That said, like online, the console will still function if Kinect isn’t plugged in, although you won’t be able to use any feature or experience that explicitly uses the sensor.” Whitten added:“You have the ability to completely turn the sensor off in your settings. When in this mode, the sensor is not collecting any information. Any functionality that relies on voice, video, gesture or more won’t work. We still support using it for IR blasting in this mode. You can turn the sensor back on at any time through settings, and if you enter into a required Kinect experience (like Kinect Sports Rivals for instance), you’ll get a message asking if you want to turn the sensor back on in order to continue.”Like this? Here’s more posts:Pro-privacy folks likened to digital al-Qaida; feds want to ‘blind’ hackersBlack Hat: Smart TVs are the ‘perfect target’ for spying on youJust because you’re paranoid doesn’t mean THEY aren’t out to get youPrivacy & security nightmares: Hacking smart toilets, smart toys, smart homesGovt’s $2.7 million KILL IT WITH FIRE approach to malware: Destroy all hardwareCareful Windows Phone 8 users, connect to rogue Wi-Fi & hackers can steal passwordsBlack Hat snarky tweets as NSA Chief delivered ‘Defending Freedom & Civil Liberties’ keynoteNot cyber myths: Hacking oil rigs, water plants, industrial infrastructureHijacking Office 365 and other major services via cookie re-use flawCross-platform virus spreading as Microsoft expands MAPP programBlack Hat: It’s not ‘tricky’ for hackers to turn your phone into a SpyPhoneUSA PRISM Plus, the perfect NSA photo-sharing app for those who have nothing to hideFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe