See what you should do if you receive an email with your password in the subject



[ad_1]

This is a case of extortion, in which they use the password of the user to obtain a monetary benefit.

  See what you should do if you receive an email with your password in the subject
See what you should do if you receive an email with your password in the subject

Recently, an alert was emitted for the viralisation of an email with the word the victim in the subject, which is apparently a case of extortion according to a computer security research laboratory.

Most of those who receive the mail, open it and find a message in English that translates important things.

First of all, himself clearly states that the sender knows the password of the person, who knows his secrets and has the evidence; however, emphasizes that he does not know the victim and that no one hired him to investigate.

Later, he explains that he installed malicious software on the person's computer on adult video pages and that the user was watching videos, he accessed the Screen and to the webcam. In addition, he states that he compiled the contacts of Facebook and e-mail.

The message also says that the life of the user was studied and that a dual-screen video was created showing the video that the person watched and then what they recorded on the webcam . Subsequently extorts the person telling him that he has two options.

One must ignore the mail, in which the video will be sent to the contacts that he has in the mail and Facebook. And the second option is to pay $ 2900 for the video to be erased and continue with life as if nothing had happened.

Indicate that this is not an option to call the police, and that you must make payment in Bitcoins. The fact is that there are no videos or malicious software, the only thing that was there was a password that the attacker got from. an information leak that leaves people vulnerable to this type of attacks in the world.

What is advisable is not to answer this type of emails and be clear that this is only a hoax and that none of what they threaten is true . It is also good to periodically change passwords, use security solutions, update the device's operating system and activate the second authentication factor.

[ad_2]
Source link