![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again. Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links. Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like: "Osama bin Laden caught", Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click. These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait. One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in. Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves. It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future. So, it's better not to learn any news from e-mail messages.Try to resist the temptation to open email with some REALLY BREAKING NEWS. Don't open, don't click. And patch your browser. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Darwin bottleshop alleged attacks: Security guard hit with bottle of rum after BWS worker death Daily Mail MITRE Rolls Out Supply Chain Security Prototype Dark Reading Watch: Mons Venus security guard fights off man in devil mask trying to get into club with gun FOX 13 Tampa Rising Rate of Drug Shortages Is Framed as a National Security Threat The New York Times Homeland Security Secretary Mayorkas and German Minister of the ... Homeland Security The 2023-24 Budget: Overview of Information Security Proposals Legislative Analyst's Office Commerce Department Outlines Proposed National Security ... US Department of Commerce Vectra Match helps security teams accelerate threat hunting and ... Help Net Security Society Hill residents pool money to hire a private security guard for the summer The Philadelphia Inquirer Committee backs request for security barriers at public events Evanston RoundTable Godfrey, Staunton groups will share in $20M security grants Alton Telegraph Governor Dunleavy Announces Energy Security Task Force ... Alaska Governor Office San Jose libraries boost security - San José Spotlight San José Spotlight Security incident involving British Airways flight prompts flight delays at Sky Harbor; FBI investigating FOX 10 News Phoenix After Denver school shooting, an outcry erupts over security The Associated Press Governor Hobbs Joins Homeland Security Secretary Mayorkas For ... Arizona Governor (.gov) Pentagon Probes Why Boeing Staff Worked on Air Force One ... The Wall Street Journal TSA sees uptick in guns at BWI security checkpoint CBS Baltimore Texas ranchers testify before House, Senate on border security Texas Farm Bureau TSA to host hiring event for Des Moines International Airport Transportation Security Administration Chicago Blackhawks won't wear Pride warmups because of security concerns, according to reports - CNN Remarks at a UN Security Council Briefing on the Political and ... United States Mission to the United Nations VIA Host Job Fair for Bus Operators, Mechanics, and Transit Security ... VIA Metropolitan Transit Report: Israel offered PA full security duties over city as pilot, Ramallah refused The Times of Israel Russia's security chief blasts West, dangles nuclear threats The Associated Press Explosion in school stairwell injures Fresno teacher. Trustees question security response Fresno Bee Chesapeake schools pilot new student IDs to increase school security 13newsnow.com WVEC The Energy Security Scenarios Shell Global Security camera catches contractor going through VB renter's belongings News 3 WTKR Norfolk Thomas Jefferson High School Shooting: Students return to class with extra security FOX 4 News Dallas-Fort Worth Parents praise security at DPS schools, call for more resources after board decision - FOX 31 Denver The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration FACT SHEET: Biden-Harris Administration Announces National ... The White House Security guard shoots man at Fells Point pizza shop, police say WBAL TV Baltimore Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security NYC Security Preps Underway for Possible Trump Indictment as Soon as Next Week: Sources NBC New York CISA Regions CISA Microsoft Patch Tuesday, March 2023 Edition – Krebs on Security Krebs on Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. How To Avoid Hackers From Destroying Your Site? Recently, my site and other internet accounts ( http://www.nabaza. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. HackAttack P C. owners are constantly at risk from attacks by hackers. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. ![]() |
home | site map |
© 2006 |