Sophos alert for 'webcam trojans'
Security firm Sophos has warned of hackers using webcam spyware to steal sensitive information from victims' machines, then threaten them with information.
Security firm Sophos has warned of hackers using webcam spyware to steal sensitive information from victims' machines, then threaten them with information.
Adrian Ringland lived in Ilkeston, Derbyshire in England, used webcam trojans to capture sensitive information from the victim's computer. After that, he used this information to intimidate the teenage girls - his victims - forcing them to provide him with erotic images.
Adrian Ringland took the nickname 'Ant Jones' and participated in chat rooms to get to know the victims, then he sent you a picture that he had attached to malware, just click on the victim. This trojan is automatically enabled.
At the end of August, Adrian Ringland was forced by the British court to violate ethics and illegal computer acts. The victim of Adrian Ringland includes a 14-year-old Canadian student, 3 new English girls about 13.14 years old, and 3 other girls.
DUYLONG
You should read it
- Trojans steal YM accounts to scam in Vietnam
- 10 pieces of information used to steal your identity
- Victims hacked hackers' servers when they were caught paying ransom, rescuing thousands of other victims
- Do not post photos of check-in tickets on the Internet if you do not want to become a victim of a scam or a black society
- Ransomware: An existing 'undercurrent' threatens businesses
- Spyware replaces virus in enterprise computers
- Those who adapt to all habitats are the last survivors
- Instructions on how to provide first aid for open wounds, proper vascular rupture
- SolarMarker malware puts users at risk
- What you need to know about an information security analyst
- Serious vulnerability helps hackers attack Facebook accounts without the victim's actions
- What is Formjacking? How to prevent?
Maybe you are interested
A set of 3 free, compact and useful software indispensable on laptops These critical Bluetooth vulnerabilities allow hackers to impersonate legitimate devices How to open and extract ISO files with Winrar Decode xHelper - the kind of immortal malicious code on Android, still 'alive' after factory reset Top 10 most hated videos in YouTube history Leaking image of Pixel 4: Finally, Google also 'suffered' with multi-sensor camera cluster?