{"id":81496,"date":"2018-08-08T10:14:49","date_gmt":"2018-08-08T17:14:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=81496"},"modified":"2024-04-25T13:37:09","modified_gmt":"2024-04-25T20:37:09","slug":"porn-blackmail-scam-rattles-mac-users-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/","title":{"rendered":"Porn Blackmail Scam Rattles Mac Users: What You Need to Know"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/internet-security-concept-laptop-and-surveillance-camera\/\" rel=\"attachment wp-att-81553\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-81553\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam.jpg\" alt=\"Porn Blackmail Scam\" width=\"600\" height=\"460\" \/><\/a><\/p>\n<p>Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get as much from you as possible. And when you connect to the Internet, you&#8217;re vulnerable to malware and hackers\u00a0\u2014 it simply does not matter what computer or operating system you&#8217;re using.<\/p>\n<p>The latest trick up cybercriminal&#8217;s sleeves is a ploy utilizing a mix of social engineering and blackmail, a scam via email from someone claiming to have hacked your computer&#8217;s webcam and recorded your activities while you allegedly watched porn. The email claims you downloaded their virus while watching porn, siphoning your contacts, and they threaten to send the video of you to all of your friends, family and coworkers \u2014 unless you pay a ransom in Bitcoin (BTC) digital currency. (We&#8217;ve seen demands of anywhere between $300 to $3,000 USD or higher.)<\/p>\n<p>Although &#8220;sextortion&#8221; schemes have been widespread in various parts of the world \u2014 Australia and the Middle East \u2014 we have recently seen these showing up in large numbers across the United States. For this reason, we feel it&#8217;s important to clarify a few things and provide assistance on the best way to protect yourself.<\/p>\n<h3>How the porn blackmail sextortion scam works<\/h3>\n<p>How would you react if you received an email from someone claiming to have hacked your webcam and recorded your most private moments? What if they threatened you with blackmail by sharing the video with your relatives unless you payed them money? Would you pay the ransom? Even if you never viewed porn, what if they made similar threats to reveal your private details of all your emails? And what does it mean if the email includes a real password that you&#8217;ve used in the past? Should you be concerned?<\/p>\n<p>This is precisely the predicament a growing number of our customers discovered themselves in over the past few weeks, and it seems this scam is spreading at an alarming rate. The Intego Support Team has received an eyebrow raising uptick in calls related to porn blackmail scams,\u00a0and many of you have contacted us for help on the best way to proceed.\u00a0As part of our investigation, we gathered a few example emails to see what tricks the scammer&#8217;s use in attempt to con people out of their hard earned money.<\/p>\n<p>Here is an example scam email\u00a0that some of our customers have received:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-81535\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-scam-email-example.png\" alt=\"Porn Blackmail Scam Email Example\" width=\"876\" height=\"666\" \/><\/p>\n<h3>What to do if you received a porn blackmail email<\/h3>\n<p>If you have received such an email, it&#8217;s important to know that you most likely have not been hacked. While, indeed, <a href=\"https:\/\/www.bbc.co.uk\/news\/uk-22967622\" target=\"_blank\" rel=\"noopener\">BBC News previously uncovered<\/a> an entire industry centered on the buying and selling of access to compromised webcams, particularly those owned by women, these porn blackmail emails appear to be fake. Yes, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\" target=\"_blank\" rel=\"noopener\">your Mac&#8217;s camera can be hacked<\/a>, but in the case of the porn blackmail scam, we have no indication that the threat is real.\u00a0The video the scammer&#8217;s claim to have of you is not real. It doesn&#8217;t exist.<\/p>\n<p>But what if the scam email includes a password that you&#8217;ve used in the past? Should you be concerned? The answer is yes and no.<\/p>\n<p>No, you shouldn&#8217;t be concerned that your Mac was hacked and there is a video of you watching porn. We want to reiterate that this is a scam designed to scare you into sending the criminal money.\u00a0The truth is there is nothing else in the email that indicates they know anything about you personally; for instance, it&#8217;s not addressed to you by name and there are no details about what site you supposedly visited and when. There is also no screenshot of you or any valid proof that they have a video of you. Think about it: If they wanted to really scare you into paying a ransom, wouldn&#8217;t they show you a compromising screenshot or other proof that their threat is in fact real?<\/p>\n<p>Yes, you should be concerned that your password was leaked through a data breach. We&#8217;ve <a href=\"https:\/\/www.intego.com\/mac-security-blog\/nearly-300-million-email-accounts-hacked-change-your-passwords\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> on a number of major data breaches in which emails and passwords have been hacked, affecting hundred of millions of people, and if you were a victim of such a crime, then your old password may be in the hands of bad guys. That password in the email was likely one of the accounts affected by a data breach.<\/p>\n<p>By adding a password that you either currently still use or have used in the past, the scammer is using a tried and true <a href=\"https:\/\/www.intego.com\/mac-security-blog\/social-hacking\/\" target=\"_blank\" rel=\"noopener\">social engineering tactic<\/a> to give you the impression that they know more about you than they mention in the email. The attacker is reaching out to you under a pretext, leveraging information they previously acquired about you to give the impression that, since they have your password, they must also have that private video they claim to have recorded.<\/p>\n<h3>How to protect yourself from the porn blackmail scam<\/h3>\n<p>These blackmail scam emails are a great example why a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\" target=\"_blank\" rel=\"noopener\">layered defense<\/a> strategy is so handy. We&#8217;ve already covered why using a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a> can help you safely manage your passwords, some of which will inform you if a password you use has been compromised. But what else can you do?<\/p>\n<p>If one of these blackmail scam emails land in your junk box (or even inbox), there are a few things you can do. Take these steps to protect yourself:<\/p>\n<ol>\n<li><strong>Ignore and delete the emails\u00a0\u2014 do\u00a0not pay the ransom.<\/strong>\u00a0If you fail to pay, no video or images will be sent to your contacts; after all, the video doesn&#8217;t exist.<\/li>\n<li><strong>Scan your Mac for malware and ransomware<\/strong> with <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a>.\u00a0If you prefer free Mac antivirus, we recommend that you download and install <a href=\"https:\/\/itunes.apple.com\/us\/app\/VirusBarrier-Scanner\/id1200445649\" target=\"_blank\" rel=\"noopener\">VirusBarrier Scanner<\/a> from the Mac App Store. (For details on the difference between our paid antivirus and our free antivirus, see: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener\">Why Your Antivirus Needs Real-Time Scanning<\/a>.)<\/li>\n<li><strong>Update your account passwords online<\/strong>, particularly if it was mentioned in the email message, since it was most likely stolen as part of a broader data breach in the past and the password is no longer secure. Take note that it&#8217;s imperative for\u00a0you to be wary of which websites you create an account with since the password could be stolen. Only create accounts with trusted sources.<\/li>\n<\/ol>\n<p><strong>Further reading:\u00a0<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/cia-porn-accusation-emails-heres-what-mac-users-need-to-know\/\" target=\"_blank\" rel=\"noopener\">CIA Porn Accusation Emails: Here\u2019s What Mac Users Need to Know<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\" target=\"_blank\" rel=\"noopener\">Your Mac&#8217;s Camera Can Be Hacked<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/terrifying-spam-call-leaves-voicemail-phishing-for-icloud-logins\/\" target=\"_blank\" rel=\"noopener\">Creepy Spam Call Leaves Voicemail Phishing for iCloud Logins<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/social-engineering-beware-of-tech-support-scams\/\" target=\"_blank\" rel=\"noopener\">Social Engineering: Beware of &#8216;Tech Support&#8217; Scams<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/V4GXOhBlcAg?rel=0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get as much from you as possible. And when you connect to the Internet, you&#8217;re vulnerable to malware and hackers\u00a0\u2014 it simply does not matter what computer or [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":81532,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,5],"tags":[275,4264,116,4732,3118],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Porn Blackmail Scam Rattles Mac Users: What You Need to Know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-08T17:14:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T20:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Internet security concept - laptop and surveillance camera\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\",\"name\":\"Porn Blackmail Scam Rattles Mac Users: What You Need to Know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#primaryimage\"},\"datePublished\":\"2018-08-08T17:14:49+00:00\",\"dateModified\":\"2024-04-25T20:37:09+00:00\",\"description\":\"Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Porn Blackmail Scam Rattles Mac Users: What You Need to Know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Porn Blackmail Scam Rattles Mac Users: What You Need to Know\",\"datePublished\":\"2018-08-08T17:14:49+00:00\",\"dateModified\":\"2024-04-25T20:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#webpage\"},\"wordCount\":1188,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg\",\"keywords\":[\"Email\",\"Porn Blackmail\",\"Scam\",\"Sextortion\",\"Webcam\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Porn Blackmail Scam Rattles Mac Users: What You Need to Know - The Mac Security Blog","og_description":"Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get","og_url":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-08-08T17:14:49+00:00","article_modified_time":"2024-04-25T20:37:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg","width":400,"height":260,"caption":"Internet security concept - laptop and surveillance camera"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/","name":"Porn Blackmail Scam Rattles Mac Users: What You Need to Know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#primaryimage"},"datePublished":"2018-08-08T17:14:49+00:00","dateModified":"2024-04-25T20:37:09+00:00","description":"Our experiences online today seem, at times, much like life was probably like in the Wild West about 145 years ago. Today, online thieves are out to get","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Porn Blackmail Scam Rattles Mac Users: What You Need to Know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Porn Blackmail Scam Rattles Mac Users: What You Need to Know","datePublished":"2018-08-08T17:14:49+00:00","dateModified":"2024-04-25T20:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#webpage"},"wordCount":1188,"commentCount":6,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg","keywords":["Email","Porn Blackmail","Scam","Sextortion","Webcam"],"articleSection":["Recommended","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/porn-blackmail-webcam-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lcs","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81496"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=81496"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81496\/revisions"}],"predecessor-version":[{"id":100353,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81496\/revisions\/100353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/81532"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=81496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=81496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=81496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}