![]() “It’s a complete intrusion on our privacy and it’s not just limited to your computer, this can happen on your phone, tablet as well as other networked devices in your home like security cameras.” How does an attack work? ![]() This type of attack is known as camfecting. “What is alarming is that it also gives them remote access to your computer, including peripherals such as your webcam – meaning they can essentially watch whatever is on the other side of the lens. “Typically, Trojans are used to take over control of a person’s device – so the hacker can gain access to your computer files or steal your data, or often they will insert more harmful malware onto your device,” he says. It is, he says, happening frequently to ordinary people today. ![]() UNSW cybersecurity expert Professor Salil Kanhere says that we shouldn't assume Trojan attacks only occur in spy thriller movie plots. Once installed on a device, it can give hackers full remote access to a person’s computer. Just like the wooden horse of Greek mythology, a Trojan is a type of malware that is often disguised, in this case as legitimate software or program. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |