The Latest in IT Security

JPEGs Leveraged for Targeted Attacks

29
Nov
2013

Trend Micro has found that some cyber-attacks rely on maliciously crafted JPEG files to perform updates on themselves or to deploy new threats.

The image files contain encrypted data that the company researchers managed to extract and thus analyze the content, which consists in configuration files and binaries.

Tracked to websites located in the Asia-Pacific region, the configuration data present in the JPEGs permits attackers to change settings as well as update itse…

Comments are closed.

Categories

TUESDAY, AUGUST 20, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks