In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. As frustrating as it was deleting all of these nasty little boogers, I realized that some of these "worm" emails even came from persons I knew - or so I thought I knew.
The problem with the "Mydoom" email worm is that it specifically targets email addresses with the following extensions:
The "Mydoom" worm will have subject headings such as:
What persons need to realize is that even if you "know" the sender, you must make absolutely sure that any attachments are specifically clarified from the sender before you attempt to open these suspect emails. Most worms and viruses are spread directly through attachments. Unless you are expecting an attachment from a person you know, be cautious. Do NOT open attachments unless you are absolutely positive that your known correspondent has actually sent it to you. Another thing to remember is that the "Mydoom" worm ranges from 6,144 bytes to 29,184 bytes in size and can affect Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP. Luckily, if you have DOS, Linux, Macintosh, OS/2 or UNIX, your systems will not be affected by the MyDoom worm.
For those of you who share files through Kazaa, there is a new worm with aliases such as Worm.P2P.Apsiv (Kaspersky) and W32/Apsiv.worm!p2p (McAfee) and seemingly affects Windows systems 2000, 95, 98, Me, NT, Server 2003 and Windows XP. The damage profile has not yet been assessed, but it would be a good idea to steer clear of this one as well.
"Keylogger.Stawin" is probably one of the nastiest viruses as it attempts to steal a user's online banking information. A Trojan is distributed through email messages with the subject line, "I still love you," and has a "message.zip" attachment. Affecting the same vunerable systems as mentioned above, Keylogger records keystrokes and has the ability to steal personal, financial information. A few systems that Keylogger monitors are window titles such as "PayPal," "Logon," and numerous other window titles associated with banking logins.
Common Hoaxes
A popular hoax circulating the Internet is an email titled, "FREE M &M's." Sorry guys - no M & M's here. More recently, you may have received the "Life is Beautiful" virus ... er, hoax. The "Life is Beautiful" virus is not real and should be ignored. This is only a scare tactic that causes unwarranted fears and concerns.
In closing, the Internet is a massive electronical world filled with infinite bits of information. When using your "key" to this magnificent but vast window of versatile knowledge, it pays to use logic when distinguishing hoaxes from real threats such as viruses and worms.
Copyright 2004 - All Rights Reserved
Computer Viruses, Worms and Hoaxes
by C. Bailey-Lloyd/LadyCamelot
About the Author: C. Bailey-Lloyd/LadyCamelot is the Public Relations Director & Writer for Holistic Junction -- Your source of information for Holistic Practitioners; Naturopathic Schools, Massage Therapy Schools, and Reflexology Schools; Alternative Healthcare; Insightful Literature and so much more!
NOTICE: Article may be republished free of charge as long as Author Resource Box (above) is included, and ALL Hyperlinks REMAIN in tact and active.
![]() |
|
![]() |
|
![]() |
|
![]() |
What is Phishing? In a typical Phishing attack, a criminal... Read More
If you have used a Windows machine for a while,... Read More
In today's times spyware is a very serious issue and... Read More
There are ways to insure security though. You can get... Read More
Spyware protection software is the easiest way of removing spyware... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
As the number of people using the Internet as an... Read More
When we think of adware, what comes to mind are... Read More
Be careful of sites that promise to send you "instant... Read More
The trash folder in my main inbox hit 4000 today.... Read More
First, let's do a little recap'. As I stated in... Read More
It's late. You've been scouring the web for that perfect... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
I got a virus the other day, Thursday I believe... Read More
When surfing the Internet you probably take your anonymity for... Read More
The words Corporate Security may conjure up images of a... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Someone recently told me, "You would have to be a... Read More
In 1997, I decided after 15 years as a practicing... Read More
There has not been a time in the history of... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Identity theft is one of the most common criminal acts... Read More
They're out there. Individuals trying to make a quick buck... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
The 1998 Data Protection Act was not an extension to,... Read More
If you are a parent, as am I, I think... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Watching how the traditional media covers the latest virus or... Read More
Many of us have run into an annoying and time-consuming... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Paypal is a great site and is used by many... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Every single time you access a website, you leave tracks.... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Identity theft is one of the most common criminal acts... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Long gone are the days that we could feel secure... Read More
File sharing on p2p is soaring despite the music and... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Many of us have run into an annoying and time-consuming... Read More
The first thing people think about when defending their computers... Read More
Well, if that would have been said to me by... Read More
The Threat10 years ago you could probably have run no... Read More
When the Internet first came about, it was realized it... Read More
Over the past few years as the internet has become... Read More
This is the second in a series of articles highlighting... Read More
Paypal is a great site and is used by many... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Credit card fraud is a growing problem for online businesses... Read More
Imagine my surprise when I received a phone call from... Read More
As more people are logging onto the Internet everyday, Network... Read More
It has been said that with the wealth of information,... Read More
I am the victim of an internet scam. It is... Read More
With the Internet entering our lives in such an explosive... Read More
When surfing the Internet you probably take your anonymity for... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Spyware is software that runs on a personal computer without... Read More
First of all we need to get some terms stated.... Read More
Phishing is a relatively new form of online fraud that... Read More
Fishing on the Internet has come a long way. However,... Read More
Working from home has its advantages, including no commute, a... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Internet Security |