Doing so will empower employees to help protect a company’s data and reputation.Even so, that’s just the beginning of what enterprises should be doing to protect themselves against digital extortion.
The other weakness is when they are married, for example. Users can protect themselves against sextortionists like the one that targeted Samir by following some best practices for social networking sites.
He also thinks the video would likely go to his loved ones’ junk mail and that they wouldn’t click on a link from a suspicious sender anyway. One week later, the man reaches out to Samir and says he’s about to upload the video onto You Tube. The video goes up, and Samir gets to work: “I keep reporting the video.
Each time I’m watching the number of views to see if anyone else has viewed it. “From what I can tell, all the views were mine, except for one.
The webcam is a cherished tool of digital extortionists.
With the help of a remote access trojan (RAT) like Black Shades or Dark Comet, a bad actor can “slave” a user’s computer, assume control over their webcam, record the unknowing individual, and leverage that footage to get what they want from their victim.