| < Day Day Up > |
|
A computer forensics team was asked to assist in a case where it was suspected that industrial espionage had taken place through the computer system. It was suspected that a number of techniques had been used to plant spyware (remote control and covert information-gathering programs) on a network. After carrying out a preliminary on-site analysis, the team removed a number of suspect machines to their secure laboratory for further analysis. A number of machines had been compromised after employees had opened e-mail attachments that contained Trojan Horse programs (programs that are disguised as common files but actually contain malicious code). Unfortunately, these had been missed by the organization's antivirus measures. As an added service, the team's security engineers were able to offer advice and assistance in reconfiguring antivirus and firewall products to minimize the chance of a repeat occurrence.
| < Day Day Up > |
|