Israeli police uncover Trojan industrial spy ring.
The fraud is believed to have used two simple methods of attack, both of which bypassed normal safeguards such as perimeter security or antivirus programs. The first involved sending a disk to an individual at one of the targeted companies purporting to contain a business proposal. When explored, the disk would install the Trojan software on that person's PC. Alternatively, the same process could be undertaken via e-mail.
You can never have too much protection from these viruses.
No comments:
Post a Comment