Feeds

Spyware Trojan sends Hotmail to your boss

A new low

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Here's a piece of software that will make any decent human being vomit. Proudly marketed by spyware outfit SpectorSoft, it's a lowlife Trojan called eBlaster which you can e-mail to anyone in the world foolish enough to use Windows and log their keystrokes, and force their POP mail and Hotmail and Yahoo Web mail accounts to copy you in everything going on.

"eBlaster records their e-mails, chats, instant messages, Web sites visited and keystrokes typed -- and then automatically sends this recorded information to your own e-mail address," the company proudly boasts.

It's marketed as a 'tool' for over-protective parents and savvy employers, but it's basically a script-kiddie toy which can be delivered surreptitiously to a victim. The potential for abuse is extraordinary, but the company makes no mention of that. They merely warn that if you don't own the computer you infect with their Trojan, you're violating their terms. Surely that stern warning should discourage the malevolent well enough.

It's all part of a growing, post-modern set piece where the private communications of human beings is seen as 'abuse' on the job and where conscientious parents must prevent the next Columbine-style blood-fest by reading their children's personal correspondence. It's for our own good, after all. Wherever selfish, 'individual' human activity is strictly regulated, society always benefits. And what could be more noble than that?

We therefore applaud SpectorSoft for their selfless contribution to the perfect society. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.