If a hacker has gained remote access to your computer and used it to upload videos to say a youtube channel, whose IP would they be using? Theirs or yours?
I recently had this just happen to me. My youtube account was suspended. It's not a huge loss. Only used it for commenting and only 3 videos posted to it. But I am still working on getting my channel reinstated. When I search my username on yahoo and bing It shows thumbnails of "hacking" videos that were uploaded that were not mine. Weird thing is I never got an email about suspicious activity in my email account. Which is why I assume, it is my IP they were hijacking. Could youtube prove that do you think when they dig deeper? Don't people have anything better do with their lives? Like getting a real job and earning an honest living.
I recently had this just happen to me. My youtube account was suspended. It's not a huge loss. Only used it for commenting and only 3 videos posted to it. But I am still working on getting my channel reinstated. When I search my username on yahoo and bing It shows thumbnails of "hacking" videos that were uploaded that were not mine. Weird thing is I never got an email about suspicious activity in my email account. Which is why I assume, it is my IP they were hijacking. Could youtube prove that do you think when they dig deeper? Don't people have anything better do with their lives? Like getting a real job and earning an honest living.
James Besser
GabeU, Champion
TheCatWillStrike
ExSatUser
I am surprised you turned off Google notification. It is set by default.
GabeU, Champion
As for your issue, the whole notification thing is what was throwing me off, as I didn't know there was an option to turn that off. For me, if I even just sign in to Google using my lesser used laptop, but on my normal internet, it sends me a notice, so that part I couldn't figure out.
A key logger makes sense. I didn't think you'd been hacked in the traditional sense, as, I believe, the way ViaSat assigns IPs, and the way multiple people have the same IP due to the gateway, would make it very difficult for a hacker to get into your system. Well, not necessarily very difficult, especially for someone who's very good at it, but it would still be a specifically targeted, determined effort.
Now you've just got to figure out where you may have picked it up, so that it doesn't happen again. Or just be careful, anyway.