Computer security expert Ajay Ghosh says hackers in other cases had gone as far as planting child pornography on victims' computers so that authorities had a reason to seize the computer.
"So once you've infected the computer the hacker has full access to that computer. So the first thing they can do is to browse files on that computer. They can copy the files from that computer to their own computer," he said.
"They can also insert files on to the travelling executive's computer and a common thing to do is to insert compromising material, perhaps it's a photo of that executive in a compromising position. Perhaps it's child pornography.
"Inserting child pornography has the benefit that later on the authorities can come knocking on the door and seize the computer legitimately because it has child pornography on it."
Mr Ghosh said hacking was increasingly becoming big business.
"There are multiple reasons that your computer might be compromised," he said.
"Increasingly, there's a recognition that national security agencies and hackers for hire are being used to gather economic information."
- Posts : 7282
Reputation : 2620
Join date : 2009-11-25