Researchers discover 40,000 private webcams exposed online: how to secure yours now
Dark web forums are trading live camera feeds

- Default passwords and outdated firmware are turning your home camera into a public livestream, report warns
- Thousands of exposed webcams are offering a front-row seat into private and corporate life
- A simple web browser is all it takes to peek into 40,000 unsecured camera feeds
Thousands of internet-connected webcams, intended to enhance safety and convenience, are now unintentionally offering a window into private lives and secure environments.
Research by Bitsight claims over 40,000 webcams around the world are publicly accessible online, often without their owners’ knowledge.
These include security cameras, baby monitors, office surveillance systems, and even devices inside hospitals and factories.
A growing digital threat, not a hypothetical one
The investigation highlights just how easily accessible these cameras are.
“No passwords. No protections. Just out there,” wrote João Cruz, Principal Security Research Scientist at Bitsight TRACE, noting it requires neither elite hacking skills nor expensive software. In many cases, all it takes is a web browser and a valid IP address.
“We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.”
Exposed footage ranges from innocent scenes, like bird feeders, to far more sensitive views, such as home entry points, live feeds from living rooms, whiteboards in office spaces, and even operations inside data centers.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Worryingly, disturbing conversations have emerged on dark web forums, where some users share methods for locating exposed cameras, or even sell access to live feeds.
“This isn’t hypothetical: this is happening right now,” Cruz emphasized.
The United States leads with roughly 14,000 exposed cameras, followed by Japan, Austria, Czechia, and South Korea. These aren’t isolated incidents but part of a broader failure in how internet-connected cameras are deployed and managed.
Bitsight’s team scanned for both HTTP- and RTSP-based cameras, and the results suggest these figures may only scratch the surface.
Many of the exposed devices result from basic setup errors: default credentials, open internet access, and outdated firmware that leave systems vulnerable.
While vendors and manufacturers must improve device security, users also share responsibility.
Choosing products vetted for cybersecurity can help, but users should also pair their camera setups with tools like leading antivirus software and top-rated parental control solutions, which often include network monitoring to flag unusual access or unprotected devices.
Ultimately, private users should always check remote accessibility settings, change default passwords, update firmware regularly, and, especially for enterprises, enforce firewall protections and require VPN access.
You might also like
- These are the best VPN with antivirus solutions
- Take a look at our pick of the best password managers
- Epson launches subscription where you pay "just" $7.99 to rent a printer and print 50 pages every month

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.