![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again. Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links. Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like: "Osama bin Laden caught", Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click. These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait. One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in. Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves. It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future. So, it's better not to learn any news from e-mail messages.Try to resist the temptation to open email with some REALLY BREAKING NEWS. Don't open, don't click. And patch your browser. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Opinion | What Happens When There’s a Real National Security Crisis? The New York Times AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock The Hacker News Trump moves to fire several national security officials deemed insufficiently loyal, AP sources say Star Tribune Trump fires NSC officials a day after far-right activist raises concerns to him about staff loyalty AP News Trump ousts members of National Security Council staff The Washington Post Trump fires national security officials after far-right activist Laura Loomer urged him to in meeting – report The Guardian NCS⁴ Announces 16th Annual National Sports Safety and Security Conference & Exhibition Agenda The University of Southern Mississippi Advisory warns of fast flux national security threat, urges action to protect critical infrastructure Industrial Cyber Lebanon-Syria Border Talks Can Restrain Hezbollah and Boost Security The Washington Institute Trump fires national security officials after Laura Loomer ‘excoriated’ them in Oval Office meeting AL.com Trump Moves to Fire Several National Security Officials Deemed Insufficiently Loyal, AP Sources Say Military.com Utimaco Launches Post Quantum Security App Package The Quantum Insider Trump fired at least one national security aide following pressure from far-right activist Laura Loomer NBC Los Angeles Homeland Security Investigations expects more victims in Bartow Co. labor trafficking case Atlanta News First Congo War Security Review, April 3, 2025 Critical Threats House Democrats to head to U.S.-Mexico border in California to scrutinize Trump security policies Fox News IDF, Israel Police ignored all security dangers leading to Nova festival massacre The Jerusalem Post Observers say IDF abandoned Gaza border outpost in 12-hour security lapse The Jerusalem Post Trump purges national security team after meeting conspiracist Nonstop Local News Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Trump moves to fire several national security officials over concerns they’re not loyal: AP sources knopnews2.com Commission presents a European internal security strategy European Commission Annual Assessment Lists Primary Threats to U.S. National Security AFCEA International Ivanti patches Connect Secure zero-day exploited since mid-March BleepingComputer Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Senate GOP's blueprint for Trump's 'big, beautiful' agenda includes tax cuts, border security and more — here's what's inside New York Post White House National Security Officials Fired, Sources Say, in Trump's First Purge U.S. News & World Report Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Wayne Board of Education President Don Pavlak, Provides Update on School Security Measures - TAPinto ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Trump Fires Three White House National Security Officials WBZ NewsRadio 1030 Trump said to fire several National Security Council officials The Times of Israel Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com |
![]() |
![]() |
![]() |
RELATED ARTICLES
The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. HackAttack P C. owners are constantly at risk from attacks by hackers. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. ![]() |
home | site map |
© 2006 |