contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers

VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP.


Virus Writer Arrested
Author: Jeremy C. Wright, Staff Writer
Thursday, 20 January 2005, 17:05 GMT

Police in Spain have arrested a man suspected of creating a Trojan-style virus capable of making secret recordings of Internet users through their Webcams.

The suspect is a computer programmer from Madrid who identifies himself as JAS. Spanish authorities caught the man spying on various users through their Webcams and apprehended him during a week-long operation dubbed “Tic-Tac”.

JAS is alleged to have created a Trojan horse program distributed through Peer-To-Peer (P2P) networks such as Kazaa. The application can be hidden in a picture or song. Once a user opened the file, it would give the hacker remote access to the user’s computer.

JAS installed a keystroke logger to obtain confidential information such as banking passwords, as well as accessing personal photos and other confidential data stored on the victims computers.

Spanish authorities characterize the Trojan horse as "highly sophisticated" and say they believe it has already infected thousands of computers in several countries. As far as they know, no commercial antivirus products are able to detect it, they say.

Graham Cluley, senior technology consultant for Sophos, says that because the authorities have not identified which Trojan horse the suspect allegedly created, antivirus companies cannot say definitively whether or not they are able to detect it.

It's now up to the police to share whatever information they have so users can check to see if they are infected, Cluley says.

"You could see how people would be quite disturbed by the thought of being burgled and recorded in this way," he adds.

"We believe he is guilty. We found a mountain of evidence," a spokesperson for the Civil Guard says. The suspect is due to appear in court on Wednesday. If convicted, he could face years in jail, the spokesperson says.

Tuesday, September 20, 2005

Network Security

· On Security, Is Oracle the Next Microsoft?
· Secure wireless email on Mac OS X
· Internet Explorer 7 Security in Brief
· Why is Application Security so Elusive?


GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!


Wireless Security

· Secure unmanaged Wi-Fi clients
· Gartner: Secure endpoints key for mobile computing
· The Mobility Threat
· Top 10 Mobile Device Privacy Policies




Press Releases

· New fraud detection and prevention software can help companies to achieve an average increase in profit of between 10% and 40% per annum
· Managed Security Services Pioneer Cybertrust Announces Availability of OnlineGuardian 3.5
· CryptoEngine Integration of HW Acceleration With NicheStack(TM) IPv4, SSL and IPSec Dramatically Improves Communications Performance on Freescale Microcontrollers
· Juniper Networks Continues to Lead in High-End Firewall/VPN and SSL VPN Markets
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter