Feeds

New trend: Trojan which steals your pics instead of your text

That private stash of, ah, special-interest jpgs? Lifted

Choosing a cloud hosting partner with confidence

Miscreants have developed a strain of malware that steals image files from compromised systems.

The Pixsteal-A Trojan dispenses with the conventional tactic of only stealing text files, instead concentrating on uploading .jpg, .jpeg, and .dmp (memory dump) files from infected machines onto a remote FTP server.

The switch in tactics reflects the changing way that users store potentially sensitive information, an advisory by Trend Micro explains.

"Information theft routines have been mostly limited to information that is in text form, thus this malware poses a whole new different risk for users," writes Raymart Paraiso, a threat response engineer at Trend Micro. "Users typically rely on photos for storing information, both personal and work-related, so the risk of information leakage is very high. Collected photos can be used for identity theft, blackmail, or can even be used in future targeted attacks." ®

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.