Tuesday, November 19, 2024

Cybercrime: Internet and media: Lenta.ru

Date:

Ashot Hovhannisyan, founder of the DLBI data leakage monitoring and intelligence service, in an interview with the Prime agency called ways to recognize surveillance through a webcam. If we talk about monitoring using the media built into the computer, then the camera operation indicator will work.

If malicious software is used, then an indirect signal may be requests for access to the camera and microphone, the specialist added. “Also, a sign of taking control of the camera can be the unstable work of the applications that use it officially, for example, Skype, Zoom and other instant messaging services, suddenly losing access to it. And if you use a mobile device, a sharp increase in the volume of data transmission can also be a video monitoring signal, ”he explained.

Hovhannisyan recalled that access to the camera is strictly controlled by the operating system, therefore, to gain access, you must install your own software or have the user allow the connection himself. He recommended not to install unknown programs from unknown sites or unofficial stores, and also to use an antivirus.

The expert added that cybercriminals use video and audio to collect compromising evidence and intimidation. If it is enough to cover the camera lens to prevent tracking, then the captured microphone is more difficult to disable, making eavesdropping much more dangerous from the point of view of leaking confidential information.

Formerly Deputy CTO for Business Development for the Angara Ruslan Kosarim group of companies called the main signs of a hacked smartphone. According to him, any anomalous or suspicious activity of the smartphone can speak of the “penetration” of cyber criminals into the smartphone. He noted that one of the likely signs of an attack could be an increase in the battery’s discharge rate.

Ebenezer Robbins
Ebenezer Robbins
Introvert. Beer guru. Communicator. Travel fanatic. Web advocate. Certified alcohol geek. Tv buff. Subtly charming internet aficionado.

Share post:

Popular

More like this
Related

Practice Acrylic Nail Techniques Without Needing a Fake Hand

When you're starting your journey with acrylic nails, practice...

Inside the World of Common Snapping Turtles: Behavior and Habitat

The common snapping turtle (Chelydra serpentina) is one of...

How to Use Video Marketing to Promote B2C Products?

Video marketing has emerged as a powerful tool for...

Adapting to Change: The Future for Leopard Tortoise Environments

Leopard tortoises, known for their striking spotted shells and...