* Trojan horses get two users into hot water Two individuals in the U.K. were separately accused of storing child pornography on their computers, after which it was determined that a Trojan horse had placed the images on their hard drives without their knowledge.This seems to continue a trend; a couple of weeks ago, I wrote about an Australian student who was convicted of storing images of child pornography on his computer even though he believed them to be images of a heavy metal band. Although he was given a suspended sentence, he now has a criminal record for doing nothing more than failing to check the content of attachments that someone had sent to him.In the first U.K. case, a 39-year-old man from Reading, England, was accused of storing 14 images of child porn on his hard drive. Only when a computer consultant demonstrated that a Trojan horse had been responsible for the images did the court exonerate him.In the second case, a 45-year-old man from southwest England was accused of storing 172 images of child porn on his computer. He spent more than three months in jail, his ex-wife was awarded custody of their daughter, and the courts gave his home to his ex-wife. Only when the court granted the individual funds to hire a computer consultant was the man able to prove that a Trojan horse was responsible for the images on his computer. Both of these incidents, as well as that of the Australian student, should be enough motivation to make any computer user vigilant about keeping antivirus software up to date and to make them very careful about the attachments that they are willing to accept.Further, corporate managers need to be vigilant about maintaining their antivirus, antispam, firewall, corporate policies and other defenses. After all, what happens if a Trojan horse infects an innocent corporate user’s computer? As shown above, that user’s life might become a nightmare until he or she can be proven innocent. Plus, it is very likely that the user will file a lawsuit against his or her employer for not providing sufficient protection against the malicious code that caused the problem. Add to this the loss of reputation for all parties involved, and you have a very messy situation that is relatively easy and inexpensive to prevent with adequate defenses. Related content news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking news Gartner: Just 12% of IT infrastructure pros outpace CIO expectations Budget constraints, security concerns, and lack of talent can hamstring infrastructure and operations (I&O) professionals. By Denise Dubie Dec 07, 2023 4 mins Network Security Data Center Industry feature Data centers unprepared for new European energy efficiency regulations Regulatory pressure is driving IT teams to invest in more efficient servers and storage and improve their data-center reporting capabilities. By Maria Korolov Dec 07, 2023 7 mins Enterprise Storage Enterprise Storage Enterprise Storage news analysis AMD launches Instinct AI accelerator to compete with Nvidia AMD enters the AI acceleration game with broad industry support. First shipping product is the Dell PowerEdge XE9680 with AMD Instinct MI300X. By Andy Patrizio Dec 07, 2023 6 mins CPUs and Processors Generative AI Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe