Users of computers began to threaten the publication of personal videos and browser history

Date:

2018-07-25 21:00:07

Views:

167

Rating:

1Like 0Dislike

Share:

Users of computers began to threaten the publication of personal videos and browser history

Computer Users around the world have started to receive e-mails from Scam to extort money. Depending on who sent the letter, its contents may change. However, colleagues from Business Insider was able to extract common features in the letters of swindlers and find a way to protect yourself from them.

Typically, a new e-mail scams contain the following information:

the

    Your password that you ever used. the

  • Information that this password was used to crack the computer, installation it malware and tracking using web camera.
  • the
  • the Threat to provide a record with the webcam and the history of visited adult sites to relatives, friends and other contacts in case of non-payment of funds in bitcoins totaling about 1200-1600 dollars.

Such a letter can really scare because one of your passwords is likely leaked at the time of some of the popular service. But the truth is that most of the scammers do not have access to your web camera, and contacts. Most likely, they have only one of your passwords and email address. Of course, if you don't use the same password for different services, which do not strongly recommended.

Bleeping Computer report that some scammers have earned more than 50 thousand dollars in this way. These data were obtained on the basis of analysis of bitcoin wallets. But experts in the field of security believe that most likely, you have nothing to worry about. The fraudsters are not aimed at you, but mailing is automated. Here is what it says about the situation Brian Krebs, a leading journalist in the field of security:

I assume the scammer has created some script that uses user names and passwords leaked from the popular web site a few years ago, and that each victim received a letter that used the same email address to log on to a compromised web site.

Indeed it seems that the crooks are using a very old password. Maybe the victims for several years do not use them. To not be afraid of fraud, you need to use long and different passwords. To simplify the work with them there are specific password managers.

Recommended

New particles could open the way to photonic computers

New particles could open the way to photonic computers

All modern electronic devices use to transmit information of the electrons. Now in full swing, the development of quantum computers, which many consider the future replacement of traditional devices. However, there is another, no less interesting way...

New computer type architecture of the brain can improve data processing methods

New computer type architecture of the brain can improve data processing methods

Scientists from IBM are developing a new computer architecture that will be better suited to handle increasing volumes of data coming from algorithms of artificial intelligence. They draw their inspiration from the human brain, and their developments...

The company D-Wave has launched an open and free platform for quantum computing

The company D-Wave has launched an open and free platform for quantum computing

With the wide spread of quantum computers needs to produce a real revolution in the field of computer science, providing not only extra power but also improved performance in cybersecurity. We already have quantum computers, but they are available o...

Comments (0)

This article has no comment, be the first!

Add comment

Related News

7 laptops for those who want to buy the best

7 laptops for those who want to buy the best

If you want to buy the most efficient laptop today, you need to look at the model with a premium design and materials, high-resolution display, processor and 16 gigabytes of RAM. In this case, you have the choice not too big. Here...

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

Secret

Secret "pocket" Surface from Microsoft is with a folding screen

Microsoft is working on a mysterious new device from the Surface has at least a few years. The device, codenamed "Andromeda" was repeatedly flashed in patents, reports, references in the operating system, and should include design...