We all know that moment. Forget about the now famous XKCD strip that proves a long lowercase password is more secure than a short dollar-sign-riddled password. Since this password is more secure anyway, you decide to make it your new go-to password.
My post last April about the Bitcoin blackmail letter in my mailbox has become popular. In the last couple of days a new scam has emerged in which emailers use emails and passwords stolen in hacks to scare the crap out of recipients. In fact, I actually placed a malware on the adult vids porno website and guess what, you visited this site to experience fun you know what I mean.
The email went on to make huge claims like they put malware on my computer, installed a remote desktop client RDPkeylogger, enabled my camera, put on split screens, recorded me watching porn and have compromised my social media accounts. I was supposed to pay them a few hundred dollars in bitcoin or all of my contacts would get this video. Nice touch.
Imagine you've gotten your hands on a file of e-mail addresses and passwords. You want to monetize it, but the site it's for isn't very valuable. How do you use it? You convince the owners of the password to send you money.
It is easy to use the same password for every account, but this also makes it very easy for hackers to access your passwords. Can you relate? Managing life takes focus and effort, and managing your online life is no different.
Time to create another password? Make it a secure one. A little extra attention when you create a strong password can prevent an attacker from getting access to your account.
One fine or not so fine day, you check your inbox and discover a message that starts like this:. All sorts of variants exist, but the message boils down to a claim that the sender infected your computer by hacking your account or placing malware on a porn site you visited. They appear to have harvested your e-mail contacts, social networks, instant messengers, and phone book.
It claims to have compromising images of the recipient and goes on to ask for payment in order to stop the images being released publicly. Attempting to manipulate victims by claiming to have compromising images of them is known as sextortion, and its been used for years. Many people, even those who feel as though they could have been seen in a compromising position, would normally be too jaded to fall for a sextortion scam with no evidence.