That’s why we want you to keep your system up to date, run anti-malware scans, and so on. That’s why people like me harp so hard on staying safe in the first place. The hacker can do anything he wants with it. Why I harp on staying safe in the first placeĪs as soon as you say, “If I’m sure that a hacker is controlling my computer”, without going any further, I can tell you you’re screwed! It’s not your computer anymore. And if he’s any good as a hacker, he can do almost all of what I just described without you noticing. He can use your computer to send spam, or hack other computers, or spread malware, or hide his location, or do anything. He can copy your data, your history, your programs, your files, your emails, your pictures anything on your machine. And by anything, I mean anything! He can record your video, your audio, your keystrokes, your mouse movements, your screen anything you do. The bottom line is that once your machine has been compromised, a hacker can do anything. Or if you like different terminology: once your machine has been hacked, it’s not your machine anymore. Once there’s malware on your machine, it’s not your machine anymore. There’s an old adage that I think people need to hear more often: If your machine has been hacked into or is compromised in some way, then a hacker could certainly record your Skype video calls.īut the problem here is that it’s much, much worse than that. To directly answer your question, yes, absolutely. While this does seem like a very specific scenario and a very specific concern, I want to address it because it’s a fine example of what a lot of people just don’t seem to realize, something that’s very important about the nature of hacking, malware, and compromised machines.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |