Security Information |
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again. Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links. Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like: "Osama bin Laden caught", Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click. These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait. One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in. Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves. It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future. So, it's better not to learn any news from e-mail messages.Try to resist the temptation to open email with some REALLY BREAKING NEWS. Don't open, don't click. And patch your browser. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Dialing Up a Scam: Avoiding the Auto-Dialer Virus For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.Now, imagine coming across your phone bill, thicker and heavier than normal. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. |
home | site map | contact us |