Warning! JavaScript is turned off or disabled! Some features on this website will not work.
Previous Next
»

Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her

2017-11-01T10:52:01  +
Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her

Cassidy Wolf, who was crowned Miss Teen US in 2013, had her computer hacked and images of her taken via her webcam by a hacker name Jared James Abrahams, her former high school classmate. Cassidy Wolf was contacted by Jared James Abrahams, who sent her an email message telling her that she should do what she is told or else, he would release all the pictures of her that he had taken via her webcam.

Advertisements

Pictures of the 19-year-old were taken of her going to bed, changing her clothes, and other intimate moments for a year. Cassidy Wolf reported the matter to the police, which was taken over by the FBI, who arrested Jared James Abrahams.

The hacker, Jared James Abrahams, confessed to installing malware on over a 100 women’s computers so that he could obtain videos and pictures of them through their webcams. He was convicted and is now serving an 18-month sentence in Federal prison.

A CNN Video Interview of Cassidy Wolf with Anderson Cooper

If you are unable to watch the video above, please click here to watch it on Youtube.

Cassidy Wolf is encouraging persons to put a sticker over their webcams when they are not using their computers, clear browser cache and cookies. But this is simply not enough. Here are some simple ways your computer can be hacked.

Simple Ways Your Computer can be Hacked

  • installing software on fake websites in order to watch a video ( no additional software required to view videos online)
  • clicking on a link in a Facebook post, a Tweet (Twitter), an email message, or elsewhere, that takes you to a malicious website
  • downloading pirated or cracked software online embed with malware like spyware, Trojan horse or Keylogger
  • using weak or easily guessed passwords
  • opening a malicious email attachment that contains a virus, Trojan horse or other malware
  • downloading bogus antivirus software
  • downloading fake software updates
  • allowing an unknown person to access your computer remotely via a remote desktop software
  • not updating your operating system and web browsers
  • browsing the internet without antivirus software installed
  • browsing the internet without a firewall software
  • connecting your computer to an unsecured Wi-Fi connection at places like a coffee shop, hotel or other Wi-Fi hotspots
  • not protecting your Wi-Fi (wireless) connection with a password
  • allowing the "Auto Run" or AutoPlay feature in Windows, which opens a default program (could be a virus), when a flash/thumb drive is inserted into one of your USB ports
  • allow a stranger to use your computer without monitoring him/her
  • installing a malicious Facebook application
  • entering your usernames and passwords on a fake or phishing website
  • giving your username and password to someone who requests it via email or telephone

It is important that you know how your computer can be hacked, so you can prevent this from happening you.

Please share what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

Remember to help us, help you, by donating. 🎁Click here to donate

Advertisements
Comments, Questions and Reviews
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. And, when you post a comment or review, we will use your IP address to display your approximate location to other users.

 Show More Comments (0)
Write Your Comment, Question or Review
Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.