Miss Teen USA Cassidy Wolf Computer Webcam Hacked and Used To Blackmail Her
Would you share this Article with others?
Pictures of the 19-year-old were taken of her going to bed, changing her clothes, and other intimate moments for a year. Cassidy Wolf reported the matter to the police, which was taken over by the FBI, who arrested Jared James Abrahams.
The hacker, Jared James Abrahams, confessed to installing malware on over a 100 women’s computers so that he could obtain videos and pictures of them through their webcams. He was convicted and is now serving an 18-month sentence in Federal prison.
A CNN Video Interview of Cassidy Wolf with Anderson Cooper
If you are unable to watch the video above, please click here to watch it on Youtube.
Cassidy Wolf is encouraging persons to put a sticker over their webcams when they are not using their computers, clear browser cache and cookies. But this is simply not enough. Here are some simple ways your computer can be hacked.
Simple Ways Your Computer can be Hacked
- installing software on fake websites in order to watch a video ( no additional software required to view videos online)
- clicking on a link in a Facebook post, a Tweet (Twitter), an email message, or elsewhere, that takes you to a malicious website
- downloading pirated or cracked software online embed with malware like spyware, Trojan horse or Keylogger
- using weak or easily guessed passwords
- opening a malicious email attachment that contains a virus, Trojan horse or other malware
- downloading bogus antivirus software
- downloading fake software updates
- allowing an unknown person to access your computer remotely via a remote desktop software
- not updating your operating system and web browsers
- browsing the internet without antivirus software installed
- browsing the internet without a firewall software
- connecting your computer to an unsecured Wi-Fi connection at places like a coffee shop, hotel or other Wi-Fi hotspots
- not protecting your Wi-Fi (wireless) connection with a password
- allowing the "Auto Run" or AutoPlay feature in Windows, which opens a default program (could be a virus), when a flash/thumb drive is inserted into one of your USB ports
- allow a stranger to use your computer without monitoring him/her
- installing a malicious Facebook application
- entering your usernames and passwords on a fake or phishing website
- giving your username and password to someone who requests it via email or telephone
It is important that you know how your computer can be hacked, so you can prevent this from happening you.
Note: Some of the names, addresses, email addresses, telephone numbers or other information in samples on this website may have been impersonated or spoofed.
Please share what you know or ask a question about this article by leaving a comment below. Check the comment section below for additional information, if there is any. Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: email@example.com. And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search engine.
You can help maintain Online Threat Alerts (OTA) by paying a service fee. Click here to make payment.
Comments, Questions, Answers, or Reviews
To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
Write your comment, question, answer, or review in the box below to share what you know or to get answers. NB: We will use your IP address to display your approximate location to other users.