Spyware Living Up To Its Name

from the corporate-espionage dept

When most people talk about "spyware" they're discussing applications that have the ability to "phone home" with additional personal data about who you are and what you're doing. However, it sounds like some people are creating specific spyware designed to do very specific espionage. The article discusses a piece of spyware that appears to have been targeted at a specific company, looking around their network and then shooting corporate documents out, perhaps to use as blackmail later on. It appears some folks are taking "spyware" to the next level.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Anonymoose Cow-ard, 19 Nov 2003 @ 3:44pm

    Just ask Valve Software...

    Valve software had the exact same problem where someone obtained some of the Half-Life2 source code and content.

    From what I understand, the exploit was through Micro$oft Outlook via the Preview Pane.

    The moral of the story is don't use Outlook, don't open e-mail from people you don't know (although the sender can easily be forged), and don't keep copies of sensitive material on internal machines that have easy access to the Internet (even if you have a really good firewall to prevent external attacks, attacks from within can be a bitch).

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.