" Symantec " warns of programs , " crepe -ware " and publishes the means of protection , including



Company published " Symantec " (Symantec) report highlighting the Barameh which is controlled from the way the computer remotely , and after that proliferated in recent times a lot of news about spy operations suffered by users across the mobile camera to the computer
.

The company said authorities in the field of information security that these stories have driven many users to put a label on the camera to be covered during the use of computers , especially with the success of those behind these acts in recording some video footage embarrassing for users without their knowledge , and these incidents impose on users, according to " Symantec " be more careful and pay attention to the intrusion and espionage earlier .

This launches the company " Symantec " name " Crepe -ware " (Creepware) on programs that control the way the computer remotely , which is a software be installed on the user's computer without his knowledge , allowing hackers to access the device and control it remotely .

According to the company , there are generally two types of remote control software , the first featuring malicious software is installed on a user's computer without his knowledge for the purposes of the bad , and the second type is the remote control tools that are used for legitimate reasons , such as tools remote technical support and communication tools maintained for the office or home during travel .

The " Symantec " that these malicious programs have spread to a limited extent in the past , but today it is common to spread. And can stand behind these programs different group of hackers , some of them designed to earn money through fraud and extortion , and some of them seeks only behind entertainment or jokes or phishing mistakes of others .

Many do not realize the risks of users that can be caused by these programs , and others may not care about such risks , has a lot of them ended up in the problems of social, psychological and other attacks as a result of those programs .

Can hackers , according to the company , the threat of their victims to publish content that is recorded or steal them on the Internet, which may cause significant damage to the reputation of the victim , and the effects of this process over the long term , may prompt some to suicidal ideation what has caused embarrassment and harm adults.

As for the programs can " crepe -ware " to do , she said , " Symantec " These programs allow an attacker to access a range of elements in the computer of the victim files include procedures and services and preservatives ( cache ) and active networks and file Registry and printers.

It also allows some of these programs for hackers control fully to the computer and do additional procedures , such as taking a snapshot of the screen and record video from a camera computer or audio recording , as well as keep track of what is written by the victim on the keyboard and steal passwords , as well as download files and open Web pages , and may even be to display text messages on the screen or play audio messages , it can also be re- boot the computer and hide the taskbar and desktop icons , added to it to cause the failure of the system to work, the screen goes blue screen of death known .

This and there are several uses for the programs , " crepe -ware " , said " Symantec " including the possibility of voyeurism , where hackers exploit the camera and microphone in the user's computer for his portrayal of the subtle , as well as the possibility of theft of information and files , as they are to steal or delete user information such as bank details and passwords traffic and files such as photos and videos.

The company also extortion , where they can use the image and video files on your computer or those that are recorded using a camera Computer to force the victim to send more photos , videos, the most obvious or to ask for money from him .

According to the " Symantec " , may hackers relying on programs " crepe -ware " to pay the computer to carry out a strange such as displaying images or Web sites inappropriate or messages offensive , and in some cases are cause of breaking down in the system, and the hackers this harm the purpose of entertainment in this case , hackers can also use the computer to attacks distributed denial of service (DDoS), as hackers take advantage of this situation in the resources available to the victim of frequent attacks .

As for how to protect the users themselves of these programs , drew " Symantec " first that the programs " crepe -ware " up to the computer by loading operations , it has a user to download a program of the type " crepe -ware " without his knowledge when you visit a Web site , in addition to ties malignant , where they can lead the links malicious user to gain access to sites bad a user to download a program of the type " crepe -ware " without his knowledge , and are posted these links malware via social networks and chat rooms on the Internet or incoming messages or e-mails annoying .

The attackers broke the user account and send malicious links from his account to his friends not to complain about them , and resort to the use of messages tempting to push users to the open positions of the previous links .

And finally said , " Symantec " post normal files and files torrent " of peer-to -peer ," In this case, according to the company , are integrated installation program " crepe -ware " with another file may be applied commonplace , or keys, to record a game , and not share this file on site dedicated to file sharing. When this file is opened software is installed , " crepe -ware " automatically on the computer .

For the protection of software " crepe -ware ," advises " Symantec " By following a few steps , such as updating antivirus software and operating system to the latest version available , and avoid opening emails from unknown sources , and do not open attached files in suspicious messages .

It is incumbent upon users also Be careful before you open links with titles attractive and exciting and received via e -mail or chat messages ( Chat ) or social networks , as they should not download files only from legitimate sources and reliable , as well as the need to be careful of activities is that are expected across the web camera , and close the cover , which obscures the camera , and if there is no cover Put a paper label on the camera when not in use .

Post a Comment

Follow Us

Follow Us On YouTube

Hot Products in Week

Hot Products in Month

item