You'd better learn news from media, not from emails, security experts warn us users again.
Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links.
Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like:
"Osama bin Laden caught",
"Saddam Hussein has died",
"Michael Jackson tried to commit suicide".
Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click.
These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait.
One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A
On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in.
Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves.
It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future.
So, it's better not to learn any news from e-mail messages. Try to resist the temptation to open email with some REALLY BREAKING NEWS.
Don't open, don't click. And patch your browser.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Spyware and adware are becoming major problems for online surfers... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
You can detect spyware online using free spyware cleaners and... Read More
The average computer is packed with hidden software that can... Read More
Ok, you've got a computer, and you get online. You... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Viruses are, however, not the only malicious software programs out... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Every day millions of people go online to find information,... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Much has been said on the theory of password protection... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
As the number of people using the Internet as an... Read More
When it comes to reporting Internet scams most of us... Read More
You may not realize it, but as you are surfing... Read More
In 1997, I decided after 15 years as a practicing... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Identity theft rates one of the fastest growing crimes in... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Imagine this ? you open up your email box and... Read More
Is your data secure? Think again. Securing data is unlike... Read More
There are several basic concepts to keep in mind when... Read More
Nowadays more and more people are using a computer. A... Read More
If you are wondering how to fight spyware for safe... Read More
Pharming is one of the latest online scams and rapidly... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
If you run any type of Internet business, Adware and... Read More
History and BackgroundThe virus was one of the first ever... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
A new variation of the Nigerian Scam theme ... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Ebay is a great site and is used by many... Read More
Millions of people make purchases online, but many people are... Read More
Over the past few years as the internet has become... Read More
This is the second in a series of articles highlighting... Read More
Working from home has its advantages, including no commute, a... Read More
Every single time you access a website, you leave tracks.... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Computer infections can be broken up into 4 main categories... Read More
Sooner or later everyone with an email account will receive... Read More
Spyware is software or hardware installed on a computer without... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Well, if that would have been said to me by... Read More
First off I should explain what phishing is. Phishing is... Read More
Whether we like it or not, we are all living... Read More
So called phishers try to catch the information about the... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
The Internet is a vast International Network of people and... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
In 1997, I decided after 15 years as a practicing... Read More
P C. owners are constantly at risk from attacks by... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
A friend called me one day and asked if I... Read More
A little bit of time invested into learning about internet... Read More
File sharing on p2p is soaring despite the music and... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
In the past I've never really paid much attention to... Read More
A couple of days ago, I was searching for a... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
There you are busily typing away on your PC or... Read More
Internet Security |