Virtually every computer sold today comes with a dirty little secret.
It can spy on you.
What’s more, if hackers can infect your computer with malware they can hijack your webcam and secretly watch you too – regardless of whether they’re based down the street or on the other side of the world.
In some cases, if they’re really sneaky, hackers can even spy on you without the LED on your webcam lighting up.
If you have a webcam – and almost undoubtedly you do if you have a cell phone, pc, laptop, tablet or home (or commercial) camera security system with an Internet connection – then you are at risk of being hacked via your camera’s IP address.
All a hacker needs to do is figure out where your camera is located, and then a stalker can watch your every move.
Luckily, however, there are ways to protect yourself from unsavory or unwanted people spying on you in your own home or business. We will teach you how to easily protect yourself from being covertly observed without your consent. But first, let’s explore how a webcam hack can occur. (The more you know, the less vulnerable you are.) For the purpose of this instructional, we will refer to a pc but this information also applies to all of your other electronic devices with cameras.
How Can A Stalker Hack Your Webcam:
To get on your computer, hackers use a remote access tool, or a RAT. If you’ve ever had a tech support rep access on your computer remotely to change settings or try to fix a problem, they used a RAT.
Fortunately, RATs require your permission to let someone on to your computer remotely; the person can’t just take control. That means a hacker has to trick you into letting them on to your computer, and there are several preventable ways they do that.
How Do Hackers Trick You Into Accessing Your PC:
To get a RAT on your computer, hackers have a number of tricks: fake email attachments or malicious links , Trojan viruses, phony tech-support calls, and so forth. Once you’ve been tricked into running a file, clicking a link or otherwise inviting them on to your system, they will take control and spy on you at will.
Think you are too tech savvy to fall for scam email? Click anywhere on the below indented paragraph to take this quick quiz from our friend, tech goddess Kim Komando, to see if you, like 80% of those surveyed, will fail to distinguish between real email and phishing scams.
Back in December, CBS News joined forces with Intel Security to create a quiz where readers can test their knowledge on phishing emails. The quiz consisted of 10 different emails in which readers simply need to decide: legitimate email or phishing email?
How Can You Spot a RAT?
(Our first line of advice is to avoid unsolicited email attachments and links, run up-to-date security software and thoroughly vet anyone who contacts you claiming to be tech support for a major, known company. Also, you may not know that Windows has a RAT built in. Almost all Windows OS versions contain a RAT for ease of access for real tech support.)
Firewall and Antivirus Software
View Processes Running
Right-click your Windows toolbar and select “Task Manager.” Click the “Processes” tab in Task Manager. This window gives you a list of programs running on your machine. Review them for any strange names or names that you don’t recognize as typical programs. If you don’t recognize the name, type it into Google. Several sites tell you if a process is malicious, so you know if you have a RAT on your system.
Odd Startup Programs
In some cases, the hacker might want another program to start when you boot your computer. If you notice any strange programs that start up when you boot your computer, you might have a RAT. These secondary programs are usually malicious software also, so you’ll need to remove them when you remove the RAT.
View the List of Installed Programs
Open Windows Control Panel and view the list of programs installed on your computer. If you notice any odd programs, then it could be malicious. In fact, the popular software TeamViewer used to collaborate remotely with people is often used as a RAT. If you didn’t install it on your computer, you should remove it. This application gives remote access to authorized and unauthorized people.
Slow Internet Connection
If you normally have fast speeds but lately your Internet connection is extremely slow, you should first check the router and wireless connection. However, if the hacker is downloading information from your computer, he uses the bandwidth and creates noticeable lag on the network. If you suspect that someone is remotely accessing your computer, the fastest way to stop it is to disconnect from the Internet.
A security recommendation, protect any and all access to your electronic devices with a really strong password. This first line of defense has a very high success rate in keeping out most hackers.
BNI Operatives: Situationally aware.
As always, stay safe.