Latest (all topics)
Top stories
Daily round-up
Web site of the day
Gadget of the day
Video of the day
Innovations
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
Beware Of Web-Mole Threat!
 
Following reports of ‘Web jacking’, a new type of crime sweeping the Internet, computer forensics experts are urging IT managers to investigate its use in industrial espionage.

National computer forensics firm, Zentek Forensics, claims that while Web-jacking is a new phenomena for home PC users, similar techniques are being widely-used in commercial environments.

Web-jacking involves planting a Trojan on a PC or server in order to gain access to or steal files, often with criminal intent. Trojan programs are so-called because they enter a system in a seemingly harmless way, but once activated release ‘malicious code’ which effectively unlocks a back-door to PCs and servers.

Whereas home PC users are being taken in by the use of ‘pop-ups’ to plant the Trojan, businesses face an even bigger potential threat - from their people. In today’s cut-throat business environment, there is a rise in cases of companies sending spies into competitors. The moles’ go ‘undercover’ as employees to plant the Trojan directly onto computer hard drives, usually via a portable storage device such as a memory stick.

Even those with seemingly robust IT security are at risk, as John McConnell, Forensics Analyst at Zentek Forensics, explains: “We had a case where a ‘keylogger’ had been installed by a cleaner, which captured the key strokes of the company and sent them to their competitor. They lost some major accounts, however we were able to discover the hidden Trojan on the system, which gave the company legal recourse.”

Businesses often investigate the possibility of industrial espionage by checking files themselves, however they inadvertently render the evidence inadmissible in Court. John says: “Computers, like any other crime scene, need to be treated carefully. The biggest issue in cases of industrial espionage is the preservation of evidence. For example, the simple act of opening an email or investigating file access by suspect employees could ruin your evidence.

“Businesses should call in computer forensic experts in cases of suspicion, at the earliest opportunity. The hardware can be then analysed in the proper manner, and any evidence recovered can be presented in Court.”

Advancements in the computer forensics industry over the past 10 years means it is playing an increasing role in prosecutions of all types of cases, ranging from fraud, terrorism, and industrial espionage to employment tribunal hearings and commercial contract breaches.

[Best Security Software Pricing UK]
[Best Security Software Pricing US]




 
BIOS, Jun 15, 06 | Print | Send | Comments (0) | Posted In Security
Related Articles

Defending In Depth
Cyber Security & Other Games
Second Life, Second Identity?
Don't Choke In The Name Of Security
A Baker's Dozen Of Security Bytes
Patching Up Security
Webroot Software Spy Sweeper 5.3
PC Tools Spyware Doctor 4.0
How Cybercrime Operations Work
ZoneLabs ZoneAlarm Internet Security Suite 7

More...
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators