Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 6 November 2013

Is someone watching you through your webcam?

Posted on 08:13 by Unknown
Sounds like something from a sci-fi movie or a far-fetched thriller doesn’t it? Clicking your mouse just a couple of times activates your computer or laptop’s webcam. So far so convenient. But what the majority of us don’t realize is that while we’re busy working or surfing the web, someone could be watching us.


The curse of the RAT

You’re probably thinking this is already creepy enough without me throwing rats into the mix but a RAT (Remote Access Tool) is the software that hackers use when they want to remotely hack into a computer. RATs are actually used legally by computer engineers to remotely troubleshoot issues on someone else’s PC. The difference is that the person with the tech issue asked the engineer to fix their problem. Hackers, clearly, exploit this technology for their own means. Put simply if you’ve been hacked and your webcam is activated, you could be under surveillance. RAT tools are usually divided into two groups: commercial/free and malicious. Your antivirus software may detect some of the commercial tools as potentially dangerous which is a good thing to know because someone might indeed use them they way they should not be used. Malware does everything to hide itself, so obviously it won't be visible on your screen. If the webcam is being run by cleverly designed malware you may never see webcam sofware running on your computer.

How can I tell if the webcam has been hacked?

Usually, when the webcam goes on, the light should go on, too. However, certain malicious programs that were designed to activate your webcam and spy on you may turn on your camera without turning on the light. This is especially true if the light is under the control of webcam software. So, if you suspect that someone might be watching you through your built-in webcam for example, scan your computer with anti-malware software. Spybot is usually a good choice. SUPERAntispyware and Malwarebytes may be useful as well.

How does a RAT get onto my PC?

The way RAT software installs itself on your machine is much like any other piece of malware. You’ll be enticed into clicking on a link, opening an attachment in an email, downloading a seemingly innocuous piece of software or visiting either an unscrupulous website or one that has been hacked.

The RAT, a little like its namesake sneaks onto your computer and just like that a hacker has remote access to your machine - and your webcam.

How do I stop my webcam from being hacked?

Many people tell you to address the problem by covering your webcam’s lens with a piece of paper; however doesn’t this seem like an ostrich-like reaction? The proverbial burying your head in the sand. If your webcam has been hacked, so too has your PC and that can lead to real problems.

The trick therefore is to prevent yourself from being hacked in the first place and there are a number of sensible steps you can take to protect yourself.

Install anti-malware software and a two-way firewall

This really is the basic protection for any PC. Make sure your anti-malware is the latest version and that you run it frequently. A good anti-malware will find and remove malware and viruses. A two-way firewall oversees what traffic is inbound and outbound on your machine.

Watch what you’re clicking

We’ve all seen those fun free icons or wallpapers or been tempted by free downloads but hackers embed their malware code into these and use them to install their malware - or RATs. Therefore make sure you trust the site you are downloading from. Also be wary of links in social media sites such as Facebook and Twitter that have been shortened so you can’t tell where they’re linking to.

Be wary of so-called remote IT support companies

Getting emails or phone calls from someone telling you that you have an issue that needs to be fixed on your computer? What’s that you say, you can fix it remotely? No thank you very much!

Make sure you use a secure Wi-Fi network

Any hacker worth his salt can hack into an unsecure wireless connection with just a laptop, an antenna and the right (easy-to-find) software. Protect yourself by choosing a strong and abstract password – and change it on a regular basis.

Disable Windows Remote Access

One way to make your computer less vulnerable is by disabling Windows Remote Assistance and Remote Desktop. Although, as discussed, the majority of RATs hack your system through links and attachments this is still a sensible step to take.

Follow the steps below to disable Remote Assistance and Remote Desktop for Windows 7 and Windows 8:

1. Click Start and go to Computer.

2. Right click on Computer and choose Properties.

3. On the left you’ll see Remote Settings. Click it.

4. Go to the Remote tab and un-tick Allow Remote Assistance connections to this computer.

5. Then click Don’t allow connections to this computer. Click OK.

Protect your computer, your files and your privacy and don’t fall victim to having your webcam hacked.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security Advisories | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • Remove RiskTool.Win32.BitCoinMiner (Uninstall Guide)
    RiskTool.Win32.BitCoinMiner is a risk tool or potentially unwanted application that may use your computer's resources to generate bitco...
  • Remove Rattlingsearchsystem.com (Uninstall Guide)
    Rattlingsearchsystem.com is a ZeroAccess/Sirefef rootkit-related browser hijacker that redirects users to shady websites while searching on...
  • Remove TR/ATRAPS.Gen2, removal instructions
    Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different...
  • Remove Ask Search and Ask Toolbar (Uninstall Guide)
    Ask Search and Ask Toolbar are very often incorrectly classified as virus/spyware that may cause search redirects. The majority of us pref...
  • How to remove 'TidyNetwork' adware virus from your computer
    As internet users most of us have seen those irritating little pop-up windows that are advertising something that we normally have little or...
  • Remove Windows Attention Utility (Uninstall Guide)
    Windows Attention Utility is a rogue security application that generates misleading warnings about nonexistent viruses and attempts to lure...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ▼  2013 (173)
    • ►  December (6)
    • ▼  November (13)
      • How to Remove Aartemis Portal Site (aartemis.com)
      • Connect Toolbar Removal Guide (Conduit)
      • Remove BuzzSearch ads, removal guide
      • Remove the do-search.com browser hijacker (Uninsta...
      • Remove jsf.jsticket.net pop-up virus (Removal Guide)
      • Remove wvd.proresync.net pop-up virus (Removal Guide)
      • Remove Deal Slider, removal guide
      • What is cltmngui.exe and how to remove it?
      • How can I get rid of dosearches.com on Chrome, Fir...
      • Remove pht.gzipserver.net pop-up virus (Removal Gu...
      • What is BrowserSafeguard.exe and how to remove it?
      • Is someone watching you through your webcam?
      • Remove BackgroundContainer.dll Error Message (Remo...
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ►  June (31)
    • ►  May (25)
    • ►  April (15)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (11)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ►  2011 (239)
    • ►  December (8)
    • ►  November (18)
    • ►  October (21)
    • ►  September (24)
    • ►  August (28)
    • ►  July (32)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile