Feeds

Scumbags punt Trojan with baby kidnap lure

A new low

Remote control for virtualized desktops

With a sick email malware campaign, pond dwelling scumbags are claiming to have kidnapped the children of would-be targets of infection.

The contemptible junk mail messages attempt to panic recipients into opening email attachment supposedly carrying images of abducted infants but in reality loaded with a variant of the Resex information stealing Trojan.

Net security firm Sophos reports that the malicious emails come with subject lines such as "We have hijacked your baby" and claim a $50,000 reward is needed for the child's safe return. Images of the email can be found here

Lucre-loving malware authors have few scruples using national or internal disasters or fictitious news events - up to and including the supposed outbreak of World War III - to punt their wares. But even by these debased standards, the Resex Trojan lure represents a new low.

Fortunately, few people have thus far fallen for the trick. Sophos said that incidents of infection by the Trojan remain, well, low. ®

Intelligent flash storage arrays

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.