Net attacks: Cyber spanners observe women secretly per webcam.

Infecting computers of private persons, spying them out systematically, observing per webcam and pinching its data - Comment on 2013 March 15 (3)

Website: countdown4us.com
Home | Comments | Creation | Redemption Period | Miscellaneous
Home > Comments > 2013 > Comment on 2013 March 15 (3)
2008 | 2009 | 2010 | 2011 | 2012  |  2013 |
End: Go to the end of this webpage.

When a so-called ratter (derived from the software name RAT) succeeds to infect a computer, he can theoretically take over the control over the whole computer with such a tool. Can see all files and activities and per webcam his victim. Read more:

One could make it a habit to always immediately eliminate cameras of computers before one comes too close to them. To immediately after the purchase cover the camera of one’s own computer nicely with reinforced sticking plaster and with other people’s computers, as for example in an internet café, turn the camera away or cover it somehow.

The people from which one has the computer could indeed also have equipped the computer so that it functions as spying machine and listens in and hears in and sends it to them and makes it possible for them to steal whatever is on the computer, to change it, therefore to influence it so as they like. The same way as a telephone can serve as a bug so also a computer can do that. Here an example of this: 2013 Feb 28 (2) – Spyware programs installed on hired computers sent extensive data material back to company server.

The transformation of a computer into a bugging machine was already dealt with in 2011 Jun 18 – Hacking attacks a fact of life.

Here extracts from a report of today:

 

Net attacks: Cyber spanners observe women secretly per webcam

They get hold of access to other people’s computers – and spy out their victims over their own webcam: So-called ratters stalk unsuspecting women, then they publish photos and videos in the net. The persons affected mostly just clicked on something naively.

It is a horror idea: One sits before the computer in baggy clothing, eats rather inelegantly a pizza. But then the scene gets recorded and published in the net. Most intimate moments – visible for everyone. The worst: That happens constantly. More and more often hackers get hold of access to the computers of complete strangers. Over the webcam they can see every movement of their victims.

Threat through hackers who infect the computers of private persons, spy on them systematically, observe and pinch their data files. Actually hackers is said too much because a marked technical knowledge for this attack is not necessary. Good instructions are enough and a Remote Administration Tool, RAT. Something like this is actually used to log on to a computer, for example to execute repair works. Actually very practically.

But as so often also this technology can be abused for another purpose. And when a so-called ratter (derived from the software name RAT) succeeds to infect a computer, he can theoretically take over the control over the whole computer with such a tool. Can see all files and activities and per webcam his victim.

 

Back to: 2013 March 15 (3)
Top: Go to the top of this webpage.
2008 | 2009 | 2010 | 2011 | 2012  |  2013 |
Home | Comments | Creation | Redemption Period | Miscellaneous
Site Map: For an overview of this website and for access to the individual webpages.
The web address of this webpage is:
http://www.countdown4us.com/en022013/en022013077.htm