Today marks the world photography day. With the invention of the camera in the 19th century, it became possible to capture moments, whether they are from our daily lives or historical moments. However, in a world that is interconnected and continually dependent on the Internet, new threats are also emerging, both for cameras and for smartphones and their contents.

In fact, we are witnessing a very rapid technological development. Something that allowed the democratization of photography, making it possible to take high-resolution photos and share them in a matter of seconds through the smartphone on social networks. A comfort that, as we well know, is not without risks, both for the machine and for the user.


5 great tips to photograph safely this World Photography Day

  1. Make sure the devices use the latest firmware version. Install a software patch or update where available
  2. Turn off WiFi network connection when not in use
  3. Use your own hotspots and don’t connect to public WiFi hotspots
  4. Have the latest versions of the applications in use (smartphone and tablet)
  5. Do not install apps from unknown sources or not validated by app store protection programs such as the Google Play Store and Apple App Store

about world photography day We’ve compiled the best security tips from Check Point Software. It is the world’s leading company in cybersecurity solutions. Therefore, we consider relevant the main care that must be taken with the use of cameras and smartphones, as well as tablets.

Cameras and smartphones are competitors and complements.

In particular, cameras and smartphones are competitive and complementary products.


Although both have the possibility of recording videos and taking photos in high resolution and communicate through common protocols such as USB and WiFi, they are complementary in terms of editing and sharing content. They do this quickly and easily on most computers. In fact, in practice, everything is processed through smartphone applications.

In view of the above, these technologies and forms of communication between devices and content exchange make these devices more susceptible. They are often targets of attacks that compromise the security of their data.

The use of WiFi in public areas, the use of unverified applications in photo editing, are the most used forms of attack. For this reason, we present the testimony of Check Point Software, as well as the respective advice that users can take to avoid being infected.