May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform.
Some of the spam emails sent by this Trojan takes to respectable German news outlets, such as Spiegel etc., as reported by MicroWorld, which contain articles on:
1. "Necessasity of Health Reforms";
2. "asylum seekers receive first class private supply while medical supply for Germans abolished";
3. "Dentists- enormous content increases expense of the contribution payers" etc.
It affects Windows operating system and is also know by aliases such as Email-Worm.Win32.Sober.q and W32/Sober.q@MM
In order to protect yourself from this worm ensure that you have the very latest update of the eScan/MailScan software. MicroWorld provides Hourly Updates to its customer.
For further information on detection and removal of "Troj/Sober-Q" please visit the below mentioned link.
http://www.mwti.net/virusnews/virusalertd.asp?id=610
Download the free MicroWorld Anti Virus Toolkit that detects viruses in system registry and running processes
Link 1 --- ftp://ftp.microworldsystems.com/download/tools/mwav.exe
Link 2 --- ftp://update.mailscan.info/download/tools/mwav.exe
For more information please write to manish@mwti.net
For technical support please mail to support@mwti.net
MicroWorld (http://www.mwti.net) is the publisher of world's first real time antivirus and content security software eScan and MailScan, for desktops, file servers, citrix servers, proxy servers and Mail Servers. Working on revolutionary MicroWorld Winsock Layer(MWL) technology, MicroWorld's time tested and reliable products have seen bestowed with certificates and awards by some of the most prestigious testing bodies like Virus Bulletin, Checkmark, TUCOWS, and Advanced CheckVir, Red Hat Ready, Novell Ready etc.
MicroWorld Technologies is one of the leading solution providers for Information Technology, Content Security and Communications Software. MicroWorld's Revolutionary "MicroWorld-WinSock-Layer (MWL)" technology, the first of its kind in the world. It deals with these threats before they enter your network, in the same way that a firewall controls user access.
![]() |
|
![]() |
|
![]() |
|
![]() |
What is a Firewall?The term "firewall" illustrates a system that... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Viruses are, however, not the only malicious software programs out... Read More
If you run any type of Internet business, Adware and... Read More
You are at your computer, checking out software on EBay.... Read More
Working from home has its advantages, including no commute, a... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Phishing is the act of some individual sending an email... Read More
Internet scams and frauds are on the rise! The quantity... Read More
When it comes to reporting Internet scams most of us... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
There is no doubt that "how-to articles" have become a... Read More
There are ways to insure security though. You can get... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
First the basic definition of Spyware: It is a type... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
A friend called me one day and asked if I... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
P C. owners are constantly at risk from attacks by... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Did you know...? 1 in 5 children who use computer... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
As you know, this time the virus under the name... Read More
There are several basic concepts to keep in mind when... Read More
Do you really have to know how feeds work? Not... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Ok, ok, I know you've seen them. All those pop... Read More
This really chapped my lips...I recently bought a new computer.... Read More
History and BackgroundThe virus was one of the first ever... Read More
I am the victim of an internet scam. It is... Read More
There is nothing more important that password security in world... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Imagine my surprise when I received a phone call from... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
There has not been a time in the history of... Read More
The trash folder in my main inbox hit 4000 today.... Read More
In today's times spyware is a very serious issue and... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
I got a virus the other day, Thursday I believe... Read More
The Internet is a vast International Network of people and... Read More
What is computer security? Computer security is the process of... Read More
The most frustrating part of having Spyware on your computer... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Well, this is an article I never thought I would... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Every day millions of people go online to find information,... Read More
My first experience with a spyware BHO based infection was... Read More
Have you ever got an email asking you to confirm... Read More
Today the internet is a mine field of malicious code... Read More
Phishing is the act of some individual sending an email... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
There are several basic concepts to keep in mind when... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Internet Security |