![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer Viruses, Worms, and Hoaxes
In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. As frustrating as it was deleting all of these nasty little boogers, I realized that some of these "worm" emails even came from persons I knew - or so I thought I knew. The problem with the "Mydoom" email worm is that it specifically targets email addresses with the following extensions:
The "Mydoom" worm will have subject headings such as:
What persons need to realize is that even if you "know" the sender, you must make absolutely sure that any attachments are specifically clarified from the sender before you attempt to open these suspect emails. Most worms and viruses are spread directly through attachments. Unless you are expecting an attachment from a person you know, be cautious. Do NOT open attachments unless you are absolutely positive that your known correspondent has actually sent it to you. Another thing to remember is that the "Mydoom" worm ranges from 6,144 bytes to 29,184 bytes in size and can affect Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP. Luckily, if you have DOS, Linux, Macintosh, OS/2 or UNIX, your systems will not be affected by the MyDoom worm. For those of you who share files through Kazaa, there is a new worm with aliases such as Worm.P2P.Apsiv (Kaspersky) and W32/Apsiv.worm!p2p (McAfee) and seemingly affects Windows systems 2000, 95, 98, Me, NT, Server 2003 and Windows XP. The damage profile has not yet been assessed, but it would be a good idea to steer clear of this one as well. "Keylogger.Stawin" is probably one of the nastiest viruses as it attempts to steal a user's online banking information. A Trojan is distributed through email messages with the subject line, "I still love you," and has a "message.zip" attachment. Affecting the same vunerable systems as mentioned above, Keylogger records keystrokes and has the ability to steal personal, financial information. A few systems that Keylogger monitors are window titles such as "PayPal," "Logon," and numerous other window titles associated with banking logins. Common Hoaxes A popular hoax circulating the Internet is an email titled, "FREE M &M's." Sorry guys - no M & M's here. More recently, you may have received the "Life is Beautiful" virus ... er, hoax. The "Life is Beautiful" virus is not real and should be ignored. This is only a scare tactic that causes unwarranted fears and concerns. In closing, the Internet is a massive electronical world filled with infinite bits of information. When using your "key" to this magnificent but vast window of versatile knowledge, it pays to use logic when distinguishing hoaxes from real threats such as viruses and worms.
Copyright 2004 - All Rights Reserved About the Author: C. Bailey-Lloyd/LadyCamelot is the Public Relations Director & Writer for Holistic Junction -- Your source of information for Holistic Practitioners; Naturopathic Schools, Massage Therapy Schools, and Reflexology Schools; Alternative Healthcare; Insightful Literature and so much more! NOTICE: Article may be republished free of charge as long as Author Resource Box (above) is included, and ALL Hyperlinks REMAIN in tact and active.
MORE RESOURCES: Netanyahu said demanding Hamas leaders exiled, Gaza demilitarized, Israeli security control of Strip The Times of Israel Large Language Models Pose Growing Security Risks The Wall Street Journal The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Trump administration orders Pentagon to plan for sweeping budget cuts The Washington Post 377th Security Forces Group Honorary Commander immersion kirtland.af.mil Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases WIRED Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations All Things Investigations: CFIUS - Balancing Security, Investment and Innovation with Sean Reilly JD Supra Streamline Your Security: Automate Compliance Database Assessments with Qualys Cloud Agent Qualys Blog CISOs wollen Cloud-Security vorantreiben CSO Online 5 Security Cameras for the Price of One? Blink Outdoor 4 Now Discounted to $200, Only $40 Each Gizmodo Did You Work at the National Nuclear Security Administration? We Want to Hear From You. The New York Times When Brand Loyalty Trumps Data Security Dark Reading DOJ Regulations Will Restrict Data Transactions to Address National Security Concerns Akin Gump Strauss Hauer & Feld LLP The Case For Tetairoa McMillan: Maye's security blanket of the future? NBC Sports Boston Tufin Reports Record 2024, Driven By Increased Demand for Comprehensive Network Security Solutions Business Wire Remarks at a UN Security Council Open Debate on Practicing Multilateralism, Reforming and Improving Global Governance United States Mission to the United Nations The Security Implications of Developments in Biotechnology International Institute for Strategic Studies HSToday Welcomes Former DHS Chief Information Security Officer Kenneth Bible to Editorial Board HSToday Lahaina to implement stronger security measures as fire victims suffer string of thefts Hawaii News Now Major general will teach on national security Hillsdale Collegian Integrating LLMs into security operations using Wazuh BleepingComputer PUMA’s Sustainability Efforts for Climate, Water Security and Forests Receive ‘Leadership Level’ Scores From CDP Business Wire New CodeMeter Embedded Security, Usability, and Flexibility Features to be Unveiled at Embedded World 2025 A3 Association for Advancing Automation ipoque, HSU/UniBw H join to boost critical infrastructure security with advanced 5G drone detection technology IndustrialCyber Trump administration freezes funds to Palestinian security forces The Washington Post Taiwan’s Nuclear What-If: Implications for U.S. Strategy and Global Security Global Security Review Cleared to connect: American Airlines pilots streamlined security program in collaboration with US and UK governments American Airlines Newsroom OpenText launches threat detection for Microsoft security tools Techzine Europe Video: How Omega Systems Puts The Security In MSSP Channel Insider How Q-Day and Security Demands Are Fuelling Cloud Modernisation IT Security Guru SEALSQ Follows Microsoft’s Majorana Quantum Breakthrough with Comprehensive Post-Quantum Security Solutions Morningstar AppSOC Named a Featured Launch Partner for the Second Edition of the Cutting-Edge Databricks AI Security Framework Business Wire Alectra Inc. employees unite with compassion to raise $200,000 for United Way’s food security programs GlobeNewswire Zelenskiy: Ukraine Offering Fast, Constructive Accord With US on Security, Investments U.S. News & World Report AITX Announces HERO, the Humanoid Robot Addition to RAD's Safety & Security Solutions Lineup Yahoo Finance Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire TP-Link Systems Inc. Appoints Adam Robertson as New Director of Information & Security Business Wire Officials revise proposed boundaries for downtown Dayton NATO Village security zone Dayton Daily News 1Password helps MSPs boost security and streamline their operations Help Net Security Topic: Relations with Ukraine NATO HQ Democratic Senators Send Letter to Homeland Security Demanding End Wrongful ICE Searches & Harassment of Tribal Members Native News Online Indra Launches Pan-European Port Security Project The Defense Post Munich Cyber Security Conference 2025 Brunswick Group NATO chief says 'robust' security guarantees needed to end Russia's 'terrible aggression' in Ukraine Anadolu Agency | English Next-Gen Security Revolution: This AI-Powered Robot Could Replace Human Guards at 1/5 the Cost StockTitan Hospital attack leads to increased calls for added security for nurses WPBF West Palm Beach San Antonio Airport introduces post-security guest pass Passenger Terminal Today Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds Security Today Ukrainians are looking past NATO to a European security architecture Al Jazeera English A Policymaker’s Guide to China’s Technology Security Strategy Information Technology and Innovation Foundation |
![]() |
![]() |
![]() |
RELATED ARTICLES
Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. Everything You Need To Know About Spyware and Malware You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.. Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission.. Don't Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. Protecting Your Children On The Internet If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. Dialing Up a Scam: Avoiding the Auto-Dialer Virus For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.Now, imagine coming across your phone bill, thicker and heavier than normal. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. ![]() |
home | site map |
© 2006 |