Tech Gaming Report

Latest Tech & Gaming News

Cybercrime: Internet and media: Lenta.ru

Cybercrime: Internet and media: Lenta.ru

Ashot Hovhannisyan, founder of the DLBI data leakage monitoring and intelligence service, in an interview with the Prime agency called ways to recognize surveillance through a webcam. If we talk about monitoring using the media built into the computer, then the camera operation indicator will work.

If malicious software is used, then an indirect signal may be requests for access to the camera and microphone, the specialist added. “Also, a sign of taking control of the camera can be the unstable work of the applications that use it officially, for example, Skype, Zoom and other instant messaging services, suddenly losing access to it. And if you use a mobile device, a sharp increase in the volume of data transmission can also be a video monitoring signal, ”he explained.

Hovhannisyan recalled that access to the camera is strictly controlled by the operating system, therefore, to gain access, you must install your own software or have the user allow the connection himself. He recommended not to install unknown programs from unknown sites or unofficial stores, and also to use an antivirus.

The expert added that cybercriminals use video and audio to collect compromising evidence and intimidation. If it is enough to cover the camera lens to prevent tracking, then the captured microphone is more difficult to disable, making eavesdropping much more dangerous from the point of view of leaking confidential information.

Formerly Deputy CTO for Business Development for the Angara Ruslan Kosarim group of companies called the main signs of a hacked smartphone. According to him, any anomalous or suspicious activity of the smartphone can speak of the “penetration” of cyber criminals into the smartphone. He noted that one of the likely signs of an attack could be an increase in the battery’s discharge rate.

See also  Twin Universe Sandbox MMO Releases Subscription-Based mostly Beta August 27