![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer Viruses, Worms, and Hoaxes
In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. As frustrating as it was deleting all of these nasty little boogers, I realized that some of these "worm" emails even came from persons I knew - or so I thought I knew. The problem with the "Mydoom" email worm is that it specifically targets email addresses with the following extensions:
The "Mydoom" worm will have subject headings such as:
What persons need to realize is that even if you "know" the sender, you must make absolutely sure that any attachments are specifically clarified from the sender before you attempt to open these suspect emails. Most worms and viruses are spread directly through attachments. Unless you are expecting an attachment from a person you know, be cautious. Do NOT open attachments unless you are absolutely positive that your known correspondent has actually sent it to you. Another thing to remember is that the "Mydoom" worm ranges from 6,144 bytes to 29,184 bytes in size and can affect Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP. Luckily, if you have DOS, Linux, Macintosh, OS/2 or UNIX, your systems will not be affected by the MyDoom worm. For those of you who share files through Kazaa, there is a new worm with aliases such as Worm.P2P.Apsiv (Kaspersky) and W32/Apsiv.worm!p2p (McAfee) and seemingly affects Windows systems 2000, 95, 98, Me, NT, Server 2003 and Windows XP. The damage profile has not yet been assessed, but it would be a good idea to steer clear of this one as well. "Keylogger.Stawin" is probably one of the nastiest viruses as it attempts to steal a user's online banking information. A Trojan is distributed through email messages with the subject line, "I still love you," and has a "message.zip" attachment. Affecting the same vunerable systems as mentioned above, Keylogger records keystrokes and has the ability to steal personal, financial information. A few systems that Keylogger monitors are window titles such as "PayPal," "Logon," and numerous other window titles associated with banking logins. Common Hoaxes A popular hoax circulating the Internet is an email titled, "FREE M &M's." Sorry guys - no M & M's here. More recently, you may have received the "Life is Beautiful" virus ... er, hoax. The "Life is Beautiful" virus is not real and should be ignored. This is only a scare tactic that causes unwarranted fears and concerns. In closing, the Internet is a massive electronical world filled with infinite bits of information. When using your "key" to this magnificent but vast window of versatile knowledge, it pays to use logic when distinguishing hoaxes from real threats such as viruses and worms.
Copyright 2004 - All Rights Reserved About the Author: C. Bailey-Lloyd/LadyCamelot is the Public Relations Director & Writer for Holistic Junction -- Your source of information for Holistic Practitioners; Naturopathic Schools, Massage Therapy Schools, and Reflexology Schools; Alternative Healthcare; Insightful Literature and so much more! NOTICE: Article may be republished free of charge as long as Author Resource Box (above) is included, and ALL Hyperlinks REMAIN in tact and active.
MORE RESOURCES: Security alert: It’s time to update your iPhone — again NewsNation Now Secretary Antony J. Blinken At the Addressing the Urgent Security Situation in Haiti Meeting - United States Department ... Department of State Mozambique-U.S. seek to deepen defence, security ties Africanews English TSA showcases security checkpoint technologies in use at Antonio ... Transportation Security Administration Biden-Harris Administration Announces Final National Security ... US Department of Commerce United States Hosts UNGA Side Event: Addressing the Urgent ... Department of State Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense Biden Administration Announces Additional Security Assistance for ... Department of Defense OSCE in crisis as Russian veto threatens security body Financial Times Five questions with security expert Greg Parker Johnson Controls Operation Lone Star Bolsters Border Security To Stem Historic Influx Office of the Texas Governor Software supply chain security Grant Thornton TSA canines enhancing security at John F. Kennedy International ... Transportation Security Administration Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security Increased online security coming soon to El Camino El Camino College Union Secretary Antony J. Blinken At United Nations Security Council ... Department of State At Disagree Better Event, National Security Experts Warn of the ... - National Governors Association At Disagree Better Event, National Security Experts Warn of the ... National Governors Association DHS Homeland Security Investigations Announces Strategy to ... Homeland Security Statement by President Charles Michel at the UN Security Council ... Présidence française du Conseil de l'Union européenne 2022 Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... United States Mission to the United Nations CU Boulder earns $5 million award for 5G cellular security research CU Boulder's College of Engineering & Applied Science Diving Deep Into Key Input on the Access Control Market Security Sales & Integration Building the Quad: A Diamond of National Security United States Army Job Security Isn't Enough to Keep Many Accountants From Quitting The Wall Street Journal GEN Nakasone Offers Insight into Future of Cybersecurity and SIGINT National Security Agency Why Aviation Security Is A Deadly Serious Matter? Indiatimes.com 30th Security Forces Squadron Expeditionary Training ... Vandenberg Space Force Base Indiana University Health reports data security incident pertaining to one of its vendors FOX 59 Indianapolis Unlocking IoT Endpoint Security in 2023: What You Need to Know Security Boulevard Secretary Mayorkas Delivers Remarks at Ukrainian Cultural Artifacts ... Homeland Security ROSEN, TRUSTED INVESTOR COUNSEL, Encourages NAPCO ... GlobeNewswire Fleeing Militants Pose Challenge to Somalia’s Security Voice of America - VOA News LastPass: 'Horse Gone Barn Bolted' is Strong Password – Krebs on ... Krebs on Security Remarks by Ambassador Thomas-Greenfield at a UN Security ... U.S. Embassy Moscow Airport Security Officer Caught Stealing From Passenger, Stuffs ... View from the Wing Ambassador Linda Thomas-Greenfield Joins Secretary Blinken for ... United States Mission to the United Nations Robert Habeck on Germany's new approach to 'economic security ... Atlantic Council Why We're Pulling Our Recommendation of Wyze Security Cameras The New York Times Added security at Yom Kippur services after recent incidents RochesterFirst Chicago Mayor Signs $29 Million Deal With Private Security Firm To Create Tent Camps For Migrants Forbes Emma Watson returns to school at Oxford; tight security surrounds her studies | Onmanorama Onmanorama Opinion | Economic cooperation boosts worldwide prosperity ... The Capital Times ylera's Vision: Pioneering IoT Security and Intelligence for Healthcare Healthcare Digital 146th Security Forces Squadron Train with Emergency Management ... 146aw.ang.af.mil |
![]() |
![]() |
![]() |
RELATED ARTICLES
Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Internet Shopping - How Safe Is It? Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Parental Control - Dangers To Your Child Online & Internet Child Safety Tips Did you know.. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. ![]() |
home | site map |
© 2006 |