This tool, which sold for as little as and other sites, essentially allowed buyers to act as peeping Toms on strangers’ computers.
He is working on his Ph D at MIT and writes a blog called Snacks for Your Mind.
Sidor's latest "snack" is a demonstration of how the cameras on your Android Smartphone can be turned on without you knowing it, and sequential photos sent to a third party over the Internet.
According to the FBI and law enforcement officials, the program has been sold and distributed to “thousands” of people in more than 100 countries since 2010, affecting some 700,000 victims.
Here’s why you might want to update your anti-virus software, or, if you’re prone to dancing around your room naked, at least put a piece of tape over your webcam. Blackshades is the name of an organization allegedly owned by a Swedish 24-year-old named Alex Yücel. , a 23-year-old US citizen who was arrested in 2012 as part of the feds’ tangential investigation into Blackshades, codeveloped the Blackshades remote access tool (RAT).
Anything you can do on your computer, the hacker can do, too.
The program also includes “spreaders,” which help hackers send out malicious links from peoples’ social-media accounts, and a file hijacker tool.
The FBI has also published a list of files that you can search for on your hard drive to see if your computer has been infected.
“Regardless of the specific kind, if you get malware on your system, it’s bad,” says Christopher Budd, a spokesman for Trend Micro, a Japanese security software company.
On Monday, US officials announced the arrest of more than 90 people allegedly connected to an organization called Blackshades, which sold software that allows hackers to easily take over a Microsoft Windows computer remotely.
Last year, a college student used the tool to take nude photos of Miss Teen USA via her personal computer’s webcam.
This sort of special intelligence cooperation is a regular occurrence under the "Five Eyes" program. Obviously, when used correctly and legally, this is an important counter-terrorism tool. government still has, new legislation notwithstanding, is how to assure the proper handling of extremely personal information that is completely unrelated to any counter terrorism or criminal activity.