Blog Tag: Image-Malware

'Hacking with Pictures': Stegosploit and How to Stop It

August 02, 2017
For cyber criminals, image malware is the ideal way to launch a surprise attack. The vast majority of users do not expect a simple image file to be remotely risky. This makes attacks like "Stegosploit" particularly dangerous to both...

Beware of Email Attachments That Seem Harmless

February 22, 2017 by Yiyi Miao
Malware infections often enter networks through email attachments, and attackers are continually looking for new ways to disguise the malicious files. In the past, hackers have attached malicious JavaScript files to emails. When opened,...

Image-Borne Malware: How Viewing an Image Can Infect a Device

December 12, 2016 by Chris Qiao
There's nothing dangerous about viewing pictures in a browser, right? Most users with some level of technical knowledge are familiar with typical malware concealment methods, such as document-borne malware. But there's more than one way...

Using File Type Conversions to Eliminate Malware

April 07, 2014 by Tony Berning
There have been several stories in the news recently (here and here) about the variant of the Zeus/Zbot Trojan that was found to be using images to hide malicious code.As these articles go into in more detail, this new variant of Zeus...