Translate

Wednesday, September 19, 2012

When A Computer Hijacking is a Friends & Family Affair

I've written several times about computer scams, but this is the first time that I've written about computer hijacking, when crooks use viruses or networking skills to hack into your PC to steal information or monitor your activities. But there's a more sinister variation has surfaced recently, where computers are hijacked by so-called friends or family members to spy on your activities. Think it couldn't happen to you? Well, just to give a recent example: 

A Delaware man was convicted in October of putting a spyware program on his father's computer to capture passwords so he could read his emails. There was a more disturbing element to the story -- the father actually became a murder victim, though there was no suggestion in court that the two aspects were connected. However, in the course of his spying, the son discovered his father had been having an affair. And even though the son had planted the spyware with his mother's approval, he was still convicted of unlawfully using the computer for fraud purposes. 
 
Of course, there are circumstances when spying programs may be used legitimately (although some would still question their use). But the plain fact is that it's perfectly possible for a friend or relative, or indeed, anyone who handles your PC, to spy on your actions if they have a motive for doing so -- or if they're just control freaks.
The two most common ways they would do this would be:
  • If they ever have unaccompanied access to your PC that enables them to install monitoring programs.
  • If they know your username and passwords. They don't even need access to your computer -- they can simply log on to your accounts or online email servers and see what you've been up to.
The solution to this type of computer spying is simple -- never give other people your passwords, and change the ones you have frequently. But real computer hijacking is more difficult to deal with. The most common form of these "inside jobs" is the installation of spyware and keyloggers. If someone has access to your PC, they can install a monitoring program that could be totally invisible to you. Again, they don't necessarily need to be physically located with your computer to do this. On Windows machines they can also gain access remotely if you invite them to do so. This is done by using a feature called Remote Assistance where you give permission for someone to access your PC via the Internet so they can troubleshoot problems. However, you can't do this unknowingly. You have to agree to let them have access. 
 
Either way, here are some of the things the top-selling computer monitoring program claims it can do:
  • Record passwords
  • Watch email
  • Operate web cameras
  • Capture full screen images
  • Upload and download files
  • Produce reports on websites you've visited
The producers of this program, which appears to be perfectly legal by the way, also point out that it can be installed remotely, is virtually impossible to detect and equally difficult to remove. It can even tell you if someone found the program and tried to log into it. Your only real defense against this type of program is Internet security software that can detect key loggers. That, however, is not infallible, but having a couple of extra anti-keylogging checkers that you can manually run periodically can reduce the risk of one of these programs remaining untraced. You can find these by doing an online search for "anti keylogger." In extreme circumstances, the best preventive measure you can take is to use a program that resets your PC every day to how it was when it was first set up (assuming it was set up by you or someone you trust). But if you have reason to believe you may have one of these programs installed, the only way to be sure of getting rid of it is to completely wipe the hard drive clean and reinstall the operating system (making sure you back up your data first). If this is beyond your technical capability, then get a trustworthy person or professional to do it for you. 
 
One final thing, remember that whenever you use a PC at home, it's perfectly possible for another user in your household to see which Internet sites you visited by simply clicking on the "History" setting in your browser. Also, if you didn't shut down when you finished or if your computer is set up to automatically log you into certain accounts, another user might be able to access them and see what you've been doing or buying. So, if you have reasons to want to maintain confidentiality on your home PC, always shut down after use, password protect sensitive files, change your passwords frequently, clear your Internet history and clear your cookies -- the fragments of computer code that automatically sign you on to your accounts. You can find out how to do these last two things via either your computer's security settings or its help file usually located in the Control Panel. 
 
I'm sorry if all this computer spying stuff sounds a bit alarming. After all, most of us have friends and families whose trustworthiness is beyond reproach and beyond doubt. But if you ever find yourself in a situation where that trust is in danger of being lost, at least you now know the risks of this type of computer hijacking -- and what you can do about it. 
 
One last thing, Never give anyone your personal password to your personal computer, if they want to use it, go to user accounts and set them up an account for their use only. Be sure to lock out their ability to read your personal files.



No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)