Previous  bell    Next
bell Warning: JavaScript is turned off! Some features on this website will not work without it.

Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her

Cassidy Wolf, who was crowned Miss Teen US in 2013, had her computer hacked and images of her taken via her webcam by a hacker name Jared James Abrahams, her former high school classmate. Cassidy Wolf was contacted by Jared James Abrahams, who sent her an email message telling her that she should do what she is told or else, he would release all the pictures of her that he had taken via her webcam.
Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her
Online Threat Alerts

Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her


Rating - Thumb up Rating - Thumb down 0   
Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her

Cassidy Wolf, who was crowned Miss Teen US in 2013, had her computer hacked and images of her taken via her webcam by a hacker name Jared James Abrahams, her former high school classmate. Cassidy Wolf was contacted by Jared James Abrahams, who sent her an email message telling her that she should do what she is told or else, he would release all the pictures of her that he had taken via her webcam.

Please continue reading below.

Pictures of the 19 year-old was taken of her going to bed, changing her clothes, and other intimate moments for a year. Cassidy Wolf reported the matter to the police, which was taken over by the FBI, who arrested Jared James Abrahams.

The hacker, Jared James Abrahams, confessed to installing malware on over a 100 women’s computers, so that he could obtain videos and pictures of them through their webcams. He was convicted and is now serving an 18-month sentence in Federal prison.

Here is a CNN video interview of Cassidy wolf, telling Anderson Cooper about her ordeal.

If you are unable to watch the video above, please click here to watch it on Youtube.

Cassidy Wolf is encouraging persons to put a ticker over their webcams, when they are not using their computers, clear browser cache and cookies. But this is simply not enough.

Here a few simple ways your computer can be hacked:

  • installing software on fake websites in order to watch a video ( no additional software required to view videos online)
  • clicking on a link in a Facebook post, a Tweet (Twitter), an email message, or elsewhere, that takes you to a malicious website
  • downloading pirated or cracked software online embed with malwares like spyware, Trojan horse or Key logger
  • using weak or easily guessed passwords
  • opening a malicious email attachment that contains a virus, Trojan horse or other malwares
  • downloading bogus antivirus software
  • downloading fake software updates
  • allowing an unknown person to access your computer remotely via a remote desktop software
  • not updating your operating system and web browsers
  • browsing the internet without antivirus software installed
  • browsing the internet without a firewall software
  • connecting your computer to an unsecured Wi-Fi connection at places like a coffee shop, hotel or other Wi-Fi hotspots
  • not protecting your Wi-Fi (wireless) connection with a password
  • allowing the "Auto Run" or AutoPlay feature in Windows, which opens a default program (could be a virus), when a flash/thumb drive is inserted into one of your USB ports
  • allow a stranger to use your computer without monitoring him/her
  • installing a malicious Facebook application
  • entering your user names and passwords on a fake or phishing website
  • giving your user name and password to someone who request it via email or telephone

It is important that you know how your computer can be hacked, so you can prevent this from happening you.

Remember to leave your comment and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: info@onlinethreatalerts.com .

Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (0)