PC users have been warned not to let their curiosity get the better of them after it emerged that hackers are yet again using a popular trending topic to spread malware.
This time the malware writers are jumping on the news that nude photos of Ashley Greene, star of teen film Twilight, were leaked onto the internet, leading to huge demand for the pics.
According to Graham Cluley, senior technology consultant at Sophos, hackers are posting links on internet message boards and forums which claim to point to the photos, but actually lead to malicious sites.
Some of the malware discovered, OSX/Jahlav-C, even allows the hacker to take control of the infected PC.
Cluley added: "Don't think that you escape if you're a Windows user. The webpage determines if you are visiting from a Windows or Mac computer and serves up the appropriate flavour of malware.
"My advice is that if you're a fan of Ashley Greene, go see her movies in the cinema or on DVD, don't hunt for naked images of her on the internet."
These attacks follow similar attempts by hackers to exploit the news of leaked nude images of famous celebrities.
At the end of last month, hackers tried to lure users into downloading malware by promising to show the notorious peephole video of US sportscaster Erin Andrews.
Twilight star's pictures become latest malware threat
By
Phil Muncaster
on Aug 15, 2009 9:47AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Tech For Good program gives purpose and strong business outcomes

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Kaseya Dattocon APAC 2024 is Back

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers
Ingram Micro Ushers in the Age of Ultra
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report