Users of computers began to threaten the publication of personal videos and browser history

Date:

2018-07-25 21:00:07

Views:

430

Rating:

1Like 0Dislike

Share:

Computer Users around the world have started to receive e-mails from Scam to extort money. Depending on who sent the letter, its contents may change. However, colleagues from Business Insider was able to extract common features in the letters of swindlers and find a way to protect yourself from them.

Typically, a new e-mail scams contain the following information:

the

    Your password that you ever used. the

  • Information that this password was used to crack the computer, installation it malware and tracking using web camera.
  • the
  • the Threat to provide a record with the webcam and the history of visited adult sites to relatives, friends and other contacts in case of non-payment of funds in bitcoins totaling about 1200-1600 dollars.

Such a letter can really scare because one of your passwords is likely leaked at the time of some of the popular service. But the truth is that most of the scammers do not have access to your web camera, and contacts. Most likely, they have only one of your passwords and email address. Of course, if you don't use the same password for different services, which do not strongly recommended.

Bleeping Computer report that some scammers have earned more than 50 thousand dollars in this way. These data were obtained on the basis of analysis of bitcoin wallets. But experts in the field of security believe that most likely, you have nothing to worry about. The fraudsters are not aimed at you, but mailing is automated. Here is what it says about the situation Brian Krebs, a leading journalist in the field of security:

I assume the scammer has created some script that uses user names and passwords leaked from the popular web site a few years ago, and that each victim received a letter that used the same email address to log on to a compromised web site.

Indeed it seems that the crooks are using a very old password. Maybe the victims for several years do not use them. To not be afraid of fraud, you need to use long and different passwords. To simplify the work with them there are specific password managers.

Recommended

Created computer based on DNA, which finally can be reprogrammed

it Is believed that DNA will save us from computers. Thanks to advances in the replacement of silicon transistors, computers based on DNA promise to provide us a massive parallel computing architecture, is impossible at the present time. But here's t...

Quantum computers. Why them yet, although they already have?

Fifty years ago, smartphones would have seemed absolutely magical computers. Just as classical computers have been almost unimaginable to previous generations, today we are facing the birth of an entirely new type of computing: something so mystical ...

IBM invented "Moore's law" for quantum computers

IBM has proposed the use of a measure of the "quantum volume", which is expected to double every year — and it will be the equivalent of Moore's law, which is observed in traditional computing. According to Moore's law the number of transistors on a ...

Comments (0)

This article has no comment, be the first!

Add comment

Related News

7 laptops for those who want to buy the best

If you want to buy the most efficient laptop today, you need to look at the model with a premium design and materials, high-resolution display, processor and 16 gigabytes of RAM. In this case, you have the choice not too big. Here...

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

Secret "pocket" Surface from Microsoft is with a folding screen

Microsoft is working on a mysterious new device from the Surface has at least a few years. The device, codenamed "Andromeda" was repeatedly flashed in patents, reports, references in the operating system, and should include design...