Baby Monitors Guides

Guide to Baby Monitors Hacked (Nanit & Others): BE SAFE!

Ashley Davis

1 Comment

This website is reader-supported. When you click on links, we may earn a small commission at no additional cost to you.

Wondering if a baby monitor can be hacked or if a particular baby monitorsuch as Owlet, Nanit, and Infant Optics can be hacked? Yes, baby monitors can be hacked but at varying levels of vulnerability with some being easy and some being almost impossible to hack.

I came come hundres of news articles from as far as 2009 highlighting the alarming trend of baby monitors being hacked. As a parent myself in 2019, I became deeply concerned about these instances and delved into extensive research to gain a comprehensive understanding of the vulnerabilities and methods employed by hackers. Curious about the frequency of such incidents? Let me tell you, it happens far too frequently.

One study showed that it only takes about 98 seconds to hack an unsecured baby monitor that uses Wi-fi.

How Do Baby Monitors Get Hacked?

Back in 2015, a 21-year-old man from the U.K. made headlines with his arrest in the infamous VTech Kids Toy Hacking case. This cyber incident resulted in the compromise of millions of profiles, exposing personal details such as names and addresses, all up for grabs to the highest bidder.

The VTech case sheds light on a method used by hackers to gain access to the signal. Approximately 4.8 million different customer email addresses were compromised, including over 227,000 records of children. It was also revealed that the passwords were not encrypted as VTech had claimed.

Troy Hunt found that VTech was using MD5 hash, a very low-security encryption algorithm. The passwords were not adequately protected, making them vulnerable and easy for hackers to decode.

Although it is technically feasible for hackers to infiltrate a video stream, their primary focus is often on obtaining sensitive data such as credit card information or addresses, as highlighted by Eric Magidson, a professor of Computer Information Systems at Central Oregon Community College, during an interview.

Another way hackers can hack a baby monitor is by guessing weak passwords especially if the accounts do not have multi-factor authentication.

Nest camera hacking incidents have been reported in Houston, Chicago and Phoenix, involving hackers gaining access to baby monitors. In a response by Nest, it highlighted that it was not Nest’s fault but customers’ faults. They quoted cases where parents had reused account passwords.These unsettling events highlight the need for increased security measures when using Nest cameras.

Nest Cam Indoor and Outdoor Picture - Hacking of Nest

In a 2017 update, Nest introduced 2-factor authentication to enhance security for their camera and thermostat. Initially optional, it is now mandatory for new accounts. This authentication method involves sending a numeric code to the user’s associated cell phone for added protection against third-party hackers.


The third way hackers can gain access to baby monitors signals is by exploiting default or hardcoded accounts on the devices. An incident reported by ABC News highlights a case where a family in Houston, TX fell victim to a hacked baby monitor.

The specific model of the camera used in this incident was the Foscam FI9821P, as depicted in the accompanying images of the news story. According to the product’s FAQ, both the default username and password for this camera are set to ‘admin’, while the default HTTP port is 8090. Another incident of Foscam being hacked was also reported in Cincinnati, OH.

Below is a post that Jamie wrote following the Fredi monitor hacking

If you purchase a baby monitor for a baby monitor manufacturer that doesn’t encrypt its signals, hackers could find a way to exploit the unencrypted data. In 2019, TRENDnet, a manufacturer of baby monitors, was fined by the FTC for transmitting their customers’ login information in plain text, instead of using proper encryption methods to protect the data. Additionally, it was alleged that TRENDnet’s mobile app did not adequately safeguard their users’ information.

The TRENDnet vulnerability was also present in Motorola’s monitors. In 2016, Motorola Focus 73 and Motorola Focus 66 were successfully hacked and hackers managed to get access to control features of the camera including full control of the pan-tilt-zoom were able to redirect video feed and movement alerts.

The private Wi-Fi security key for Motorola monitors were getting transmitted without encryption on an open network, leaving it vulnerable as per this report. Researchers were able to gain root access to the camera, discovering a weak root password and obtaining the home network Wi-Fi password in plaintext. Further investigation also revealed factory wireless credentials for secure test networks.

As you can see, there are several ways that hackers can hack your baby monitor.

Which baby monitor cannot be hacked?

All baby monitors that rely on signal transmission from the camera to the display unit or smartphone device can get their signal access compromised. However, non Wi-Fi monitors that utilize Frequency Hopping Spread Spectrum’s(FHSS) closed circuit camera systems are almost impossible to hack. FHSS technology constantly changes the transmitting frequency, making it very difficult for hackers to intercept and decode the signal. Some of the recent 2nd-generation FHSS monitors allow the signal to hop by up to 70 sub-frequencies within the same channel making it extremely difficult for hackers to get a hold of the signal.

As of 2024, no Wi-Fi monitor utilizing FHSS transmission technology has been hacked.

There are a few classes of secure Wi-Fi monitors that have implemented superior security framework including sophisticated encryption frameworks, the Advanced Encryption Standard which is far superior to VTech’s MD5 hash above. Secure Wi-fi monitor systems also have multi-factor authentication, connect to password-protected Wi-Fi networks and do not have backdoor access or default admin accounts. Read more about baby monitor encryption here to fully understand its importance.

Since 2009, there have been numerous instances of Wi-Fi monitors being hacked. In my review of hacking cases, I found that hundreds of such incidents occurred up until 2024.

Can Nanit be hacked?

All devices that utilize Wi-Fi are not impossible to hack and the key determinant of whether a monitor such as Nanit can be hacked lies in its security protocols including the camera firmware and the app security framework. From my review of Nanit’s security protocols, it is very difficult to hack it as it uses the most advanced/military-grade encryption standard and requires two-factor authentication to access the app.Unless your home network is not secured, it is very difficult to hack the Nanit baby monitor as it has AES 256-bit symmetric-key encryption, the highest level available for baby monitors. The advanced encryption standard of the Nanit baby monitors makes it hard for hackers to get access to its signals.The Advanced Encryption Standard (AES) is a powerful encryption algorithm with the longest key introduced in 2001. What sets it apart is its impressive key size of 256 bits, making it significantly more challenging for hackers to decrypt compared to lower encryption key standards like AES 128 bit. AES ensures enhanced security and protection for data.According to Nanit’s website, their camera is designed to prevent unauthorized access to your video. It can only be streamed through their secure servers. Additionally, both the connection to their servers and the link to your device at home are also secure.In addition to AES and multi-factor authentication, Nanit also connects only to password-protected Wi-Fi networks that use WPA2 or WPA3 encryption and are known to be more secure than Wired Equivalent Privacy(WEP). It won’t connect to unsecured public Wi-Fi or open networks, further reducing the chances of it being hacked.Additionally, Nanit complies with federal data security regulations such as HIPAA (Health Insurance Portability and Accountability Act) which means that they follow strict guidelines to protect user data. This includes regular audits and security checks to ensure the safety of personal information, including video footage.However, as with any device that connects to the internet, there is always a risk of hacking. It is essential to regularly update your Nanit baby monitor’s firmware and app to ensure any potential security vulnerabilities are patched. Learn more about baby monitor encryption here to fully understand.Read more about Nanit’s Privacy Policy here

If you’ve heard cases of baby monitor hacking such as Lollipop hacking or even Nanit hacking, chances are that the data leak resulted from vulnerabilities in the internet settings or monitor setup rather than inherent vulnerabilities that these monitors have. Read about how baby monitors are hacked here(8 simple steps).

I also have a detailed guide on how to secure your monitor from hackers in this guide.

Can Owlet camera be hacked?

Owlet uses Wi-Fi transmission technology and it is not impossible to hack it. While it uses Advanced Encryption Standard with relatively lower encryption key of 128-bit and does not have 2-factor authentication requirement, you should use Owlet with caution regularly changing your password, using a very strong password, securing your home Wi-Fi and sharing the login credentials with people you trust.

Compared to Nanit, Miku and Cubo Ai which use the longest key and most secure AES-256 bit encryption, Owlet uses a lower-standard encryption which is still difficult for hackers to decipher the login details but not totally impossible.

Can Infant Optics Baby Monitor be hacked?

It is almost impossible to hack an Infant Optics baby monitor as it uses the latest second-generation FHSS transmission and does not connect to Wi-Fi. FHSS technology constantly changes the transmitting frequency, making it virtually impossible for hackers to intercept and decode the signal. Additionally, Infant Optics also has a secure encryption framework and does not have any backdoor access or default admin accounts.

Since its initial release of Infant Optics first generation of DXR 5 in 2010, it has maintained an impeccable record of security with no reported incidents of hacking. No cases of DXR 8 has been recorded as well.

How to tell if your baby monitor’s been hacked:

There are a few warning signs that can indicate your Nanit Pro Smart Baby Monitor (or any other baby monitor) may have been hacked. It is essential to be aware of these signs and regularly check for them to ensure the safety of your child.

  1. Strange noises or voices coming from the monitor: If you hear unfamiliar sounds, music, or voices coming from your baby monitor, it could be a sign that someone has gained access to it.
  2. Moving cameras or changing settings: If you notice your camera moving or settings being changed without you initiating the changes, someone else may have taken control of your device remotely.
  3. Blinking LED light: Some baby monitors have an LED light that indicates when the camera is in use. If you notice this light blinking even when you are not using the monitor, it could be a sign of unauthorized access. Don’t confuse other lights such as Nanit’s white flashing light when it loses or when it reconnects after losing Wi-Fi for a security breach. Read more about red lights in baby monitors here.
  4. Changed security settings: If your settings such as 2-factor authentication has been disabled or changed, or you suddenly have trouble accessing your baby monitor’s app, it could be a sign of hacking.
  5. Security alerts: Some baby monitors have security alerts in place to notify you of any suspicious activity. If you receive an alert that someone is trying to access your monitor, it is crucial to take immediate action.
  6. The music coming out from the baby monitor – Some hacked choose to play music to the baby once they get access. A popular story described a hacker who played the song, ” before the parents realize that the baby monitor got hacked and someone had been playing music to the baby.

What to do if you notice your monitor may have been hacked:

If you notice any of these signs, it is essential to take action immediately and secure your device and network. Follow the steps below to ensure the safety of your baby;

  • Change all login credentials: This includes your password, username, and security questions. It is crucial to use strong and unique passwords that are difficult to guess.
  • Secure your Wi-Fi network: Your baby monitor relies on your Wi-Fi network to function, so it is essential to ensure that it is secure. Use WPA2 encryption and a strong password for your network.
  • Update firmware: Check for any available updates for your Baby Monitor’s firmware and install them immediately. Updates often contain security patches that can protect against potential vulnerabilities.
  • Unplug the camera from power: If you suspect that your baby monitor has been hacked, unplug it from the power source immediately. This will prevent any unauthorized access to your camera.
  • Contact support: If you have taken all the necessary steps and are still concerned about the safety of your device, reach out to your baby monitor manufacturer’s customer support for further assistance. They may be able to provide

List of Hacked Baby Monitors Since 2009

Here is a list of horrifying cases of hacked baby monitors:

No Hacking Story Featured Camera/Baby Monitor Hacked
1 Nest Baby Monitor Hacked: Child Threatened with Kidnapping, CNN & Washington Post Nest Cam Indoor
2 Man Sues Summer Infant for Hacked Baby Monitor Summer Infant Monitor
3 Foscam Baby Monitor Hacked – A foul-mouthed hacker scare a baby– CNN Foscam
4 Child Threatened with Kidnapping After Baby Monitor Hack Nest Cam Indoor
5 Foscam IP Camera Hacked, Hackers Wakes Up Baby Foscam
6 Surprise! Yet Another Baby Monitor Can Be Hacked by a Child, 2018 MI-Cam Security Camera
8 Fredi Baby Monitor Hacked – A South Carolina Mom Says Fredi Baby Monitor
9 Motorola Focus66 Hack Motorola Focus 66

Is it easy to hack a baby monitor?

In 2016, Rob Graham showed how it only took 98 seconds to hack and get access to the video feed of a baby monitor. That’s less than 2 minutes! A year later, in 2017, a data security firm, Rapid7 released a vulnerability report of nine baby monitors that could be easily hacked.

In 2016, a New York State Consumer Agency warned parents to set their passwords instead of using default passwords to secure their baby monitors.

Baby monitors allow parents to watch and listen to their baby at the comfort of their home or workplace but perverts can also enjoy watching, listening or even speaking to your kid. Apart from watching your baby, hackers can also watch your entire house and robberies and online data leaks have been reported because hackers can take your personal details to facilitate a crime.

Watch this Netflix documentary about a pervert who just enjoyed watching other people:

How Hacking Works:

If you are trying to hack a baby monitor, you’re simply trying to get access to signal between the baby unit and the parent unit in order to use the control features of the camera or the microphone and/speaker to talk to the baby. Smart wifi baby monitors, which tend to feature a camera, microphone and speaker, pass live feeds through a user’s wireless router and over the Internet in order to be seen by parents remotely on a smartphone or other dedicated display unit. Without adequate security protections in place, hackers can use the camera and microphone to spy on babies and use the speaker to communicate with them.

Baby monitors have evolved from when transmission entirely relied on radio frequencies to the current over-the-internet signal transfer. In the past, radio transmitters were paired with a receiver with very low frequency  (no more than 2.4 GHz) and it limited the range of signal transfer thereby limiting eavesdropping.

The biggest advancement that baby monitors went through was the addition of video. This allowed parents to not just hear sound from the baby’s room but also view the baby. Other features were added such as night vision to make possible for parents to even view their babies when they are asleep at night.

With the emergence of the internet and smartphones, the parents can now view their babies from anywhere as long as they were connected to the internet and this is where the vulnerability came in. You may wonder who would want to hack a baby’s camera but if the recent events have taught us anything, it is that criminals take advantage of the tech loopholes to steal personal information, invade in parent-child privacy and try to communicate directly to kids.

4 Steps to Hack a Baby Monitor

In order to get access to your baby monitor feeds, the hackers do the following;

  1. Get a baby monitor that uses 2.4 GHz frequency. The 2.4 GHz frequency is an unlicensed frequency band and there are many devices that use the frequency. The hackers really just need the receiver of the baby monitor (or the parent unit).
  2. Once they’ve got your baby monitor, they power it using the batteries of the AC power. Most unsophisticated hackers set the account on their baby monitor to default as this will match with those of several other parents who opt for the default account created by the manufacturer for purposes of support.
  3. When they’ve powered the monitor and the account is now active, they then try to scan to find a baby monitor that can pair with their receiver. Most baby monitors that use the 2.4 GHz frequency will pair with the receiver.
  4. Once they find an unsecured baby monitor, they click “pair’. Depending on the receiver they are using it may give them access to remotely control the baby monitor in the baby’s nursery. They can adjust the camera viewing angle and if the baby monitor has two-way talk-back feature, they can even speak to the baby or the parent in the nursery. Some hackers have woken up the baby while others have disturbed the baby almost all night that the baby doesn’t get any sleep.

This post has details on how to hack a baby monitor

Ip Camera Hack List

  • Axis.
  • Panasonic.
  • PanasonicHD.
  • Linksys.
  • Mobotix.
  • Sony.
  • TPLink.
  • Foscam.

What hackers can do after accessing your baby monitor

  • Play music
  • Speak to your baby
  • Speak to you – If the hacker notices that you are looking at them, they may decide to speak to you. Some hackers have even threatened to kidnap the baby
  • Stream and watch videos of your baby
  • Scare the baby

10 Simple Steps to Secure Your Baby Monitor From Hackers

Below is a list we have put together here at 10BabyGear to assist you to be safe from baby monitor hackers. As explained, hackers are keen to hijack the camera signals especially on 128-bit encrypted baby monitors such as Nest Cam Indoor, iBaby M7, Fredi baby monitor, Motorola Focus66 and others.

Follow the 10 steps below to be safe from baby monitor hackers:

  1. Always update your baby monitor firmware on time Check if you have all the latest security features provided by the company. Since 2015, Rapid7 has been releasing vulnerability reports and mitigating steps to baby monitor manufacturers and it is possible that the company which sold you the device has been doing several security updates to stay ahead of hackers. As a consumer, make sure you are ahead of them by downloading the latest firmware. Most companies do the updates daily, weekly or monthly. For example, the firmware update for Motorola MBP854Connect takes place daily between 2 pm and 5 pm local time, provided there is no video and audio streaming. Check the company website of your manufacturer to get up to date information updates. Some baby monitor brands such as Eufy Spaceview you to reach email their customer support and request for an upgrade. This can be tedious and may leave you vulnerable or with a low-quality child monitor. You should always consider those baby monitors that can update its firmware automatically if it can connect to the internet. Read more about our updated baby monitor firmware update guide.
  2. Delete any hidden or default account after purchase or during set up. – Most baby monitors come with hidden accounts that are meant to be used by admins or support. Hackers can get access to these accounts and it is important to make sure you delete them. Sometimes, it can be hard to notice them as they may be hard-coded but the best way to know if you are using a default (which may be a hidden account) aside from the one you set up is to always ensure you check the user name from your display unit.
  3. Set up a strong password: Baby monitor hackers can get access to your baby monitor if they can guess the serial number of the device or if you are using a default password that is not encrypted. To make sure you change your password and use a strong, long password. Use a strong password and not “1234” or “abcd” or “baby”. Cameras that are shipped with baby monitors come with hardcoded credentials (backdoor accounts), accessible via the local web service, giving local application access via the web UI. These default credentials can be used by hackers to get access and it is advisable that you change the username and password as soon as you install the device. Also, make sure you set a very strong password by using at least 12 to 15 characters, using special characters and varied cases, never using full words such as PASSWORD, and never using personal information such as your name or keyboard patterns.  Avoid these, top ten weak common passwords that can be easily hacked.
  4. Enable Stealth Mode feature on your firewall – The stealth mode will reduce the network visibility to potential hackers.
  5. Turn Off default admin in the router settings – Make sure you are the only one who can access and adjust the router setting. You can do this by disabling the “admin via wireless” enabling you or anyone who has access to the router through the Ethernet to make any changes to the router settings.
  6. Switch off your baby monitor when not using
  7. Avoid buying pre-owned baby monitors
  8. Register your product with the manufacturer
  9. Secure your home network router – Make sure your internet router or modem is secure by changing the password and installing software updates. Routers mostly have a built-in firewall that can be used to provide extra security and you should consider enabling it.
  10. Go for baby monitors with advanced security features – Purchase a baby monitor with advanced security (AES) features, including SSL/TLS encryption and WPA2-AES encryption. There are few baby monitors with those security features but FHSS baby monitors are non-wifi baby monitors that are considered almost 100% secure or hack-proof.

Here is a full list with 25 ways you can use to secure your Wi-Fi baby monitor from hackers.

Steps Baby Monitor Manufacturers Can Do To Curb Baby Monitor Hacking

  1. Implement stricter login credentials – When baby monitors are sold to consumers, most customers do not change the factory settings as they are not fully aware of the risk. Factory settings are very easy to hack if the default login credentials are not changed. We’ve seen above how a baby monitor was hacked in 98 seconds. It is however unfortunate that some baby monitors do not allow consumers to change the default settings. When hackers get access to publicly available keys, they can easily hack any device once they locate the camera address
  2. Use advanced encryption of login keys – Baby monitor manufacturers are known to not follow the prescribed ways of transmitting login keys over the internet. While the worst companies publish login key online, some manufacturers that try to safely transfer login credentials to customers do not encrypt them. Most manufacturers do not follow the best practices such as code timestamp for verification and do not minimize unauthorized access to private keys.
  3. Seal loopholes by releasing secure firmware updates – When manufacturers release firmware updates, hackers can take advantage of unsecured files to gain access to baby monitors. In fact, most of the firmware updates come in php files. These unsecured scripts can be infected with bugs and hackers can gain remote access to the baby monitors.

Can someone listen in on my baby?

Analog baby monitors allow hackers or anyone that has access and can listen in on your baby, as long as they use the same frequency as your baby monitor. Analog baby monitors are very prone to accidental broadcasts. DECT baby monitor and FHSS baby monitors do not have this problem. It is possible to secure the network but the software that runs your baby monitor may not be secure and may serve as access for hackers. Digital baby monitors transmit their signals using wireless digitally encrypted frequency. FHSS and DECT are the best options that have encrypted digital signals in transit.

Note: D-Link and Summer Infant have all been named in vulnerability lawsuits in the past.

Baby Monitor Vulnerabilities 

In 2016, Rapid7 released a report that disclosed 10 new vulnerabilities in baby monitors made by 9 different manufacturers. 8 of the devices tested scored an “F” and only one received a “D”. The report highlights that most devices suffer from the software, hardware and firmware issues mentioned in the table below;

  1. Local communications are not encrypted
  2. Remote communications are not encrypted
  3. Data collected is stored on disk in the clear
  4. A command-line interface is available on a network port
  5. Local accounts have easily guessed passwords
  6. Physically local attackers can alter the device

4 baby monitoring apps that are free such as Dormi and available for download on Google Appstore and on Appstore were recently exposed in research for being vulnerable. Check out the insecure 4 apps here.

Companies Manufacturing Vulnerable Baby Monitors Susceptible to Hackers 

  1. Philips N.V – Sells Philips In. Sight B120/37, a baby monitor with video. The device allows parents to watch their babies on iPhone via free App on WiFi/3G/4G network. This device has backdoor accounts that result from default accounts that are difficult to disable.
  2. Gynoii – Sells baby monitors with video and it has the same vulnerability as Philips N.V. This device has backdoor accounts that result from default accounts that are difficult to disable.
  3. iBabylabs – Manufacturers three products;iBaby WiFi M6 and M7 Baby Monitor 1080P Wireless Video Camera with Thousands of lullabies & Bed Stories, Motion and Cry Alert, Temperature & Humidity Sensors, Air Sensors, Moonlight Projector
  4. Lens Laboratories – Manufacturer of Generation Ⅰ Peek-a-view 720p (1280*720) HD “Wifi” Wireless Baby Monitor Camera for iPhone, Ipad, Android Phone or Pc Remote View. This device has backdoor accounts that result from default accounts that are difficult to disable.
  5. Summer Infant – Manufacturers Summer Infant Baby Zoom Wi-Fi Video Monitor and Internet Viewing System, Link Wi-Fi Series. In 2009, a man sued Summer Infant over Summer Infant’s weak security settings.
  6. TRENDnet – Manufacturers of TRENDnet Cloud Baby Cam, IP/Network, Wireless, Video Monitoring, Surveillance, Secu Camera, Plug & Play, Two-Way Audio, Night Vision, Free app, 5 pre-installed Lullabies, MAC iPhone/Windows Android Compatible,TV-IP743SIC

All the devices above have one thing in common, they use wifi to transmit the signal. Some brands and technologies have formulated processes and developed software and hardware to make them more secure.

Which Baby Monitors Cannot Be Hacked?

I suppose the sub-heading, ‘which baby monitors cannot be hacked’ is misleading as all gadgets are susceptible but here is a list of baby monitors that are considered safe or less vulnerable from hacking. All the listed baby monitors below use FHSS 2.4GHz frequency, a spread spectrum that powered secret communication during WWII. These are our top picks.

  1. Infant Optics DXR 8
  2. Eufy Spaceview baby monitor
  3. Babysenve video baby monitor
  4. Motorola MBP36XL
  5. Anmeate baby monitor
  6. VTech VM3261
  7. UU Infant Video Baby Monitor
Can Levana Baby Monitor Be Hacked

The Levana baby monitor is considered a digital baby monitor that is very secure in several aspects.
“Well, there’s at least one baby monitor manufacturer which can give parents peace of mind! Levana baby monitors are all equipped with long ClearVu Digital Signal, which was developed exclusively by Levana. It’s a digital signal so is more secure than baby monitors which use analog. Levana state:  “No one can access it but the owner”. ”

Has Angelcare baby monitor been hacked

There hasn’t been any reported case of Angelcare baby monitor being hacked.

Has Arlo baby monitor been hacked

If you are asking yourself, can Arlo baby monitor be hacked? We have an answer for you. Arlo baby monitor can be hacked as it is a wifi baby monitor but there are a few things you should know. All recordings or streaming are encrypted with the user name and password that you create when you purchase your Arlo baby. No one else can access your recordings. On the app, you can activate bio-metric recognition which will allow you to have access to your baby monitor feed.

Foscam Baby Monitor Hacked

There have been at least five reported cases of Foscam baby monitor being hacked. In 2013, a hacker hacked into Foscam IP baby monitor and insulted a 2-year-old girl. In 2015, a hacker was reported to have been talking to a one-year-old baby in Houston. A similar incident occurred in Ohio in 2014 where a Foscam IP camera was hacked and the hacker yelled and cussed at the baby. These three incidences were reported to have resulted from delayed firmware updates that left the Foscam IP camera vulnerable.

DBPower baby monitor hacked

There haven’t been any reports of DBPower Baby Monitor being hacked. Like Infant Optics or Eufy Spaceview, DBPower is a FHSS baby monitor that uses the 2.4 GHz frequency to transmit data signals from the transmitting unit to the receiver. It does not require Wifi and is therefore hard for hackers to get access to its signal. DBPower uses the frequency hopping spread spectrum, a technology that has signals hopping from one channel to another as they are transferred. The data is also encrypted, making DBPower one of the few secure baby monitors that are hack-proof.

Has Cloud Baby Monitor Been Hacked

Cloud baby monitor is considered secure but not hack-proof as it uses home Wifi network and Bluetooth to transmit data from the baby unit to the parent unit. To set up the cloud baby monitor, you’d need to download the cloud baby monitor app from the app store. If the home wifi network is not secured, the cloud baby monitor can be hacked as the data signal is accessible to anyone with 3G, LTE or Wifi network access.

Has D’link baby monitor been hacked?

In January 2017, CNN reported that FCC was suing D-Link baby monitor as it lacked security measures that left families exposed and vulnerable to hackers. A DLink baby monitor uses default passwords that are hard-coded, meaning they cannot be easily changed. This gives hackers a back-door entry into the baby’s nursery. The FTC suit against Dlink listed several violations including the 2015 case where signing key was exposed by the company for about 6 months.

Is Infant optics hack-proof or has it been hacked?

Infant Optics DXR 8 is not hack-proof but there haven’t been any cases of it being hacked. Similar to other FHSS baby monitors such as Eufy Spaceview or DBPower, Infant Optics does not use the internet but rather rely on frequency-hopping spread spectrum (FHSS) technology that was invented in 1941. The technology allows signals to be transferred without being detected by hackers as it hops from one channel to another at a high speed, about 400 milliseconds for a hop. Infant Optics has also encrypted the data being transferred making it hard for hackers to get access to the signals being transferred.

Lefun baby monitor hacked

Lefun baby monitor is a wifi baby monitor, which means it can easily be hacked is hackers get access to the data signals. If you are purchasing Lefun baby monitor, make sure you are using a secured home network and change the default password. A search indicates that there haven’t been any reported cases of Lefun baby monitor being hacked. Lefun indicates that it uses financial level security encryption

Project nursery baby monitor hacked

Project Nursery baby monitor does not use wifi and it is almost impossible to hack it unless you are within the physical location and have access to the local network.

Uniden baby monitor hacked

It is very difficult to hack Uniden baby monitor. Uniden does not rely on the internet to transmit its data signals and is therefore impossible to hack as it uses FHSS technology.

Is Motorola baby monitor mbp36s easy to hack?

Most Motorola Baby Monitors rely on the internet to transfer its signals. A few of them do not. A few of them such as Motorola MBP33XL, Motorola MBP36S are FHSS baby monitors which do not rely on the internet and is therefore almost impossible to hack.

Baby Monitors to Avoid Purchasing :

  • iBaby M6
  • iBaby M3S
  • Philips In.Sight B120/37 All Models
  • Summer Baby Zoom Wifi Monitor and Internet Viewing System
  • Lens Peak-A-View
  • Gynoii
  • TrendNet Wifi Baby Cam TV-IP743SIC
  • Wyze Cam V2 or V3

A set of unhackable baby monitors such as Infant Optics DXR 8 and Eufy Spaceview are some of the few options parents can rely on to keep the babies safe from hackers.


If you are considering a baby monitor and don’t want to deal with the risk of getting hacked, consider getting any of these hack-proof non-wifi baby monitors that use FHSS technology. If you want to go with a wifi baby monitor, consider only purchasing those with the most advanced encryption, AES-256 bit encryption such as Nanit Plus, Miku baby monitor, Motorola Halo Plus, iBaby M7, and Safety 1st HD Wifi Baby Monitor.

Comments are closed.