Use of Malware in Espionage
Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to explo...
Gespeichert in:
Veröffentlicht in: | Medical Imaging and Information Sciences 2010, Vol.27(4), pp.102-104 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng ; jpn |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Recently, malware or computer viruses have been used in espionage aimed at governments and companies. These threats usually arrive as email attachments of specially crafted document files such as Microsoft Word files, Power Point files, Ichitaro files, and PDF files. Those files are crafted to exploit vulnerabilities exists in those applications to install malware on victim machines. One of the major types of malware installed on those attacks is backdoor trojan aiming to operate infected machines and steal information stored in machines. This paper introduces general characteristics of malware and attacks used in espionage. |
---|---|
ISSN: | 0910-1543 1880-4977 |
DOI: | 10.11318/mii.27.102 |