* Udhay Shankar N.:
Hasn't this already been going on a while? I'm only surprised there hasn't been a big public incident yet.
Doesn't this one count? | According to Chief Superintendent Arye Edelman, head of the Tel Aviv | fraud squad, which ran the investigation, Haephrati used two methods | to plant his malicious software (or malware) in the target | computers. One was to send it via e-mail. The other was to send a disk | to the target company that purported to contain a business proposal | from a well-known company that would arouse no suspicions. Then, when | an employee loaded the disk to view the proposal, the Trojan horse | would infect his computer. <http://www.haaretz.co.il/hasen/pages/ShArt.jhtml?itemNo=581790&contrassID=Cd=1> --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE