"Malware has been popping up in the strangest places lately.
Traditionally, malicious software works its way into computers when users click links or download attachments in phishing emails, or use infected thumb drives. But recent hacking campaigns have used more novel methods. One hid malware in downloadable subtitle files that activated through media players like VLC and Popcorn Time. Another was coded into the pixels of images used in a “malvertising” effort where hackers pay to get infectious ads onto legitimate websites.
Now, researchers at Trend Micro have discovered a trojan horse than activates when users hover their mouse over links and images in Microsoft PowerPoint documents."
Read the Full Article by Keith Collins
Traditionally, malicious software works its way into computers when users click links or download attachments in phishing emails, or use infected thumb drives. But recent hacking campaigns have used more novel methods. One hid malware in downloadable subtitle files that activated through media players like VLC and Popcorn Time. Another was coded into the pixels of images used in a “malvertising” effort where hackers pay to get infectious ads onto legitimate websites.
Now, researchers at Trend Micro have discovered a trojan horse than activates when users hover their mouse over links and images in Microsoft PowerPoint documents."
Read the Full Article by Keith Collins