How Remote Access Software is Used For Both Good And Evil

by

How Remote Access Software is Used For Both Good And Evil

by | Apr 5, 2022

Last Updated:
Apr 5, 2022

Recently, I was on a Zoom call with financial crime investigators from multiple financial institutions regarding cyber fraud. Each participant was asked to share the most common threat/fraud they were seeing. Many of them stated they were seeing recurring incidents of account take-over with customer. When it was my turn, I said we were continuing to see scam victims where remote access software was used. I further shared that it wasn’t unusual for us to find out that the remote access software had been on the victim’s computer or smartphone for many months. One of the participants stated that that could be the reason for the multiple incidents with customers and that they, the investigators, were unaware that remote access software could remain for a long period of time.  

So, what is remote access software?

Remote access software is a topic we’ve brought up several times in previous podcast and blog post, and in this episode Carrie and Kyle go over exactly what it is, and how bad guys are using it to their advantage.

 

LISTEN TO THE PODCAST EPISODE

LISTEN ON YOUTUBE

In this episode you’ll learn:

  • What is remote access software?
  • What are some common example of it?
  • How are criminals using it?
  • How to detect and remove it
  • What to know to minimize your risk of falling victims to these scams

Resources:

Previous episode we reference where we talk about victims of remote access software

https://privacy-mentor.com/ep47/

Visit our site for more episodes and post

https://privacy-mentor.com/

Check out true cybercrime podcast – Modem Mischief

https://www.modemmischief.com/episodes

 

Search our blog

Books by Carrie

Table Of Contents