Mark Zuckerberg doesn’t feel safe online

A small detail does not go unnoticed after seeing the image published by the owner of Facebook to celebrate 500 million followers on Instagram.

zuckinsta-asylum
Security experts say that no device is 100% secure. And that fear is common among users of new technologies, even someone like Mark Zuckerberg, uswer which we would assume features the best tools to digitally protect his devices, but with webcam calls being potentially “hackable” private conversations and photographs can be exposed.

To commemorate the 500 million users of Instagram, Facebook founder and owner of this network of photography published a picture of him in his profile. The sympathetic picture went around the world, and way too many users did not let out a small detail: his laptop, on his desktop office was covered with tape on the place of the webcam. Paranoia? ¿Urban Legend? Reality? The truth is that last year alone, Facebook invested more than 10 million pounds in security measures.

Zuckerberg, often expresses misgivings about computer security and real paranoia of being “hacked”, although recently a group of cybercriminals gained access to some of his private online services such as Twitter or Pinterest because reportedly his passwords was “dadada”, a combination clearly too weak. However, its business position (one of the world’s richest entrepreneurs) Zuckerberg, 31, shows once again how to take precautions.

This is a homemade way to plug the camera and prevent a possible cyber criminal from taking control of it and, on the other hand, the image can also be seen using duct tape to obstruct the microphone input located in the left side of the device.

Thanks to specific remote access tools, cybercriminals can interact with the victim: display messages on the screen, open a website, delete the toolbar, open the CD and endless amount of stuff. The confusion of the victim when the computer behaves strangely amuses PC and Laptop repairers.

According to company sources like Kaspersky, who believe that hackers tend to collect images of the victims without them knowing they’re being recorded and depending on the content the hacker can publish images or commit a bigger crime.