![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again. Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links. Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like: "Osama bin Laden caught", Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click. These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait. One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in. Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves. It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future. So, it's better not to learn any news from e-mail messages.Try to resist the temptation to open email with some REALLY BREAKING NEWS. Don't open, don't click. And patch your browser. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Large Language Models Pose Growing Security Risks The Wall Street Journal Europe Vows to Step Up Baltic Sea Security After a New Cable Break The New York Times UK minister met Chinese turbine company amid security concerns POLITICO Europe Protector app provides on-demand armed security ABC7 Los Angeles Electric infrastructure security measure updated Unicameral Update HackerOne Debuts New Way to Quantify Security Value Channel Insider The Jones Act : A disastrous legacy for the U.S. economy and security Pacific Legal Foundation (PLF) Elon Musk’s Private Security Are Now Special Deputies The Daily Beast Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), Steps Down HSToday EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident - The Maritime Executive EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident The Maritime Executive Russia Recommends Increased Port Security Citing Threat from NATO The Maritime Executive US Marshals Service deputizes Musk’s private security detail: Reports Straight Arrow News ThreatLocker® launches new solutions, further advances Zero Trust security resilience and adoption Yahoo Finance DOE layoffs weaken security, economic growth: “Forget American energy dominance” Federal News Network Regional peace depends on Iran's security Tehran Times Whistleblower lawyer Mark Zaid on the Trump administration's move to revoke security clearances The Record from Recorded Future News Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025 The Hacker News UN Security Council to Call on Rwanda to Pull Troops From Congo U.S. News & World Report Pennsylvania Treasury Bans Chinese AI Platform Over Security Concerns Franklin County Free Press Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News Rep. Woolford on border security Michigan House Republicans Texada achieves top security certifications American Rental Association The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Ukrainians are looking past NATO to a European security architecture Al Jazeera English How to secure Notes on iOS and macOS Help Net Security Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire Exabits partners with Phala Network to offer robust AI security with TEE-enabled infrastructure GlobeNewswire AI app DeepSeek banned on Pennsylvania treasury-issued devices over privacy, security concerns CBS News Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor TechCrunch OpenText unveils AI-powered threat detection and response capabilities Help Net Security EU seeks to strengthen underwater cable security in Baltic and Mediterranean Kathimerini English Edition Apple drops key ADP security feature in UK Mobile World Live ‘Golden ticket to job security’: Trade union partnerships hold promise for high school students Youth Today Second Take: ‘The Winter Soldier’ tackles American democracy and security The Stanford Daily DOGE access to Social Security, IRS data could create privacy and security risks, experts say The Record from Recorded Future News Tusk proposes 3-point plan to strengthen Ukraine, European security. Kyiv Independent ISC West 2025 Preview: Inside the Security Industry’s Premier Event Security Sales & Integration Unarmed, undertrained, at risk: Advocates for Hawaii’s private security guards want change Hawaii News Now Venture capital firm Insight Partners faces security breach Security Magazine ID-Pal, Facephi join influential payments, security groups Biometric Update Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases WIRED Retired doctor and courthouse security deputy seeking Belvidere Township 'CEO' job Northern Public Radio (WNIJ) |
![]() |
![]() |
![]() |
RELATED ARTICLES
The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. HackAttack P C. owners are constantly at risk from attacks by hackers. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. ![]() |
home | site map |
© 2006 |