![]() Moreover, it’s possible to switch on a microphone in the same way and it won’t produce any noticeable effects, making it easier for hackers to discretely record a user’s conversations. User photos don’t look like valuable loot, but it could be of use to cybercriminals, e.g., for identity theft. The most affected platforms are Windows 7, 8, Mac OS X and some versions of Linux. Most laptops light up a special indicator when web camera is on, but even if you notice it – it’s already too late. One mouse click – and your photo is ready and uploaded to a hacker’s server. Users still have to click the “allow” button, so an overlaying image has to have some kind of compelling interaction on it – in the screenshot down here, it’s a “Play” button. ![]() But it turns out in Chrome it’s possible to put an image over this security dialog, effectively masking it. We are not yet aware of usage of this Chrome imperfection in real-world attacks, but simplicity and efficiency of this trick makes us once again think about today’s free flow of private information.Īs you might know, Adobe Flash can use a microphone and a web camera to interact with a user it must ask user’s permission beforehand though.
0 Comments
Leave a Reply. |