![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
New Mass Mailing Spamming Internet Trojan for the Windows Platform
May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Some of the spam emails sent by this Trojan takes to respectable German news outlets, such as Spiegel etc., as reported by MicroWorld, which contain articles on: 1. "Necessasity of Health Reforms"; 2. "asylum seekers receive first class private supply while medical supply for Germans abolished"; 3. "Dentists- enormous content increases expense of the contribution payers" etc. It affects Windows operating system and is also know by aliases such as Email-Worm.Win32.Sober.q and W32/Sober.q@MM In order to protect yourself from this worm ensure that you have the very latest update of the eScan/MailScan software. MicroWorld provides Hourly Updates to its customer. For further information on detection and removal of "Troj/Sober-Q" please visit the below mentioned link. http://www.mwti.net/virusnews/virusalertd.asp?id=610 Download the free MicroWorld Anti Virus Toolkit that detects viruses in system registry and running processes Link 1 --- ftp://ftp.microworldsystems.com/download/tools/mwav.exe For more information please write to manish@mwti.net For technical support please mail to support@mwti.net MicroWorld (http://www.mwti.net) is the publisher of world's first real time antivirus and content security software eScan and MailScan, for desktops, file servers, citrix servers, proxy servers and Mail Servers. Working on revolutionary MicroWorld Winsock Layer(MWL) technology, MicroWorld's time tested and reliable products have seen bestowed with certificates and awards by some of the most prestigious testing bodies like Virus Bulletin, Checkmark, TUCOWS, and Advanced CheckVir, Red Hat Ready, Novell Ready etc. MicroWorld Technologies is one of the leading solution providers for Information Technology, Content Security and Communications Software.MicroWorld's Revolutionary "MicroWorld-WinSock-Layer (MWL)" technology, the first of its kind in the world. It deals with these threats before they enter your network, in the same way that a firewall controls user access.
MORE RESOURCES: IDF to close off road in Israel's South, activate security systems The Jerusalem Post D.C. police cite 'lax security' in closing lounge after shooting The Washington Post Apartment security guard accused of firing shots at man’s car WREG NewsChannel 3 Ransomed.vc group claims hack on 'all of Sony systems' Cyber Security Connect A ransomware group claims to have breached 'all Sony systems' | VGC Video Games Chronicle Has Sony been hacked again? Help Net Security Beijing should be cautious about going too far on public security, academic says South China Morning Post DNS security poses problems for enterprise IT Network World Notice of Funding Availability: Food Security Mini-Grants Advisory Groups & Commissions Six Steps Toward AI Security Nvidia New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State Are We Really Helping? U.S. Security Assistance to Partner Nations ... Government Accountability Office Ultimate Guide to IoT Security Testing Security Boulevard Border Security is National Security - Kansas Common Sense - U.S. ... Senator Jerry Moran Salinas looks to private security to patrol popular park KSBW Monterey Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... Customs and Border Protection Pennsylvania woman caught with loaded gun at Pittsburgh ... - Transportation Security Administration Pennsylvania woman caught with loaded gun at Pittsburgh ... Transportation Security Administration Security Think Tank: Three ways to identify the best encryption use ... ComputerWeekly.com Biden-Harris Administration Announces Final National Security ... US Department of Commerce Enhanced Security Automation: Lexington Police Urges Integration ... Robotics and Automation News Director General Grossi: IAEA is Instrument for Peace, Security and ... International Atomic Energy Agency Georgia election officials respond to lawmakers' security demands - The Atlanta Journal Constitution Georgia election officials respond to lawmakers' security demands The Atlanta Journal Constitution Biden Administration Announces Additional Security Assistance for ... Department of Defense The Intersection of network security and Wi-Fi The Register Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense Crypto Quantique introduces SaaS platform QuarkLink Ignite Help Net Security Security Spotlight: Tips to Monitor Disabled and Deleted User Accounts Security Boulevard China produces world record peanut test crop amid national food security push South China Morning Post Update on Naked Security Sophos The Security Risks of Forking The New Stack Shift5: Harnessing Raw Data for Enhanced Aircraft Security Avionics International US, Kenya Sign Defense Agreement Ahead of Haiti Security Mission Voice of America - VOA News Winston-Salem bar owner speaks out after security guard ‘brutally attacked,’ police say WGHP FOX8 Greensboro Building Your Incident Response Team Security Boulevard Abilene Pride Festival canceled due to security concerns, vendors come together with ‘Rainbow Market’ KTAB - BigCountryHomepage.com IND airport security detected most-ever firearms in 2023 FOX 59 Indianapolis Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security Security exercise scheduled Wednesday and Thursday Peninsula Daily News Cisco+ Secure Connect SASE Review & Features 2023 eSecurity Planet Security Beat: Tame Start to the Fall Semester — MARIST CIRCLE Marist College The Circle Operation Lone Star Bolsters Border Security To Stem Historic Influx Office of the Texas Governor MLB Insider Provides Update on Buck Showalter's Job Security Sports Illustrated |
![]() |
![]() |
![]() |
RELATED ARTICLES
How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPal® member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. ![]() |
home | site map |
© 2006 |