Security Information |
New Mass Mailing Spamming Internet Trojan for the Windows Platform
May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Some of the spam emails sent by this Trojan takes to respectable German news outlets, such as Spiegel etc., as reported by MicroWorld, which contain articles on: 1. "Necessasity of Health Reforms"; 2. "asylum seekers receive first class private supply while medical supply for Germans abolished"; 3. "Dentists- enormous content increases expense of the contribution payers" etc. It affects Windows operating system and is also know by aliases such as Email-Worm.Win32.Sober.q and W32/Sober.q@MM In order to protect yourself from this worm ensure that you have the very latest update of the eScan/MailScan software. MicroWorld provides Hourly Updates to its customer. For further information on detection and removal of "Troj/Sober-Q" please visit the below mentioned link. http://www.mwti.net/virusnews/virusalertd.asp?id=610 Download the free MicroWorld Anti Virus Toolkit that detects viruses in system registry and running processes Link 1 --- ftp://ftp.microworldsystems.com/download/tools/mwav.exe For more information please write to manish@mwti.net For technical support please mail to support@mwti.net MicroWorld (http://www.mwti.net) is the publisher of world's first real time antivirus and content security software eScan and MailScan, for desktops, file servers, citrix servers, proxy servers and Mail Servers. Working on revolutionary MicroWorld Winsock Layer(MWL) technology, MicroWorld's time tested and reliable products have seen bestowed with certificates and awards by some of the most prestigious testing bodies like Virus Bulletin, Checkmark, TUCOWS, and Advanced CheckVir, Red Hat Ready, Novell Ready etc. MicroWorld Technologies is one of the leading solution providers for Information Technology, Content Security and Communications Software.MicroWorld's Revolutionary "MicroWorld-WinSock-Layer (MWL)" technology, the first of its kind in the world. It deals with these threats before they enter your network, in the same way that a firewall controls user access.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. HackAttack P C. owners are constantly at risk from attacks by hackers. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. |
home | site map | contact us |