Junk mail can be REALLY nasty



As if you needed another reason to not like SPAM ( no, not the hormel product, we’re talking junk mail here.) A couple days ago I mentioned a post at the sans institute talking about an email that was circulating and the link within that email took you to a malicious site (redirected) and attempted to exploit one of the recently disclosed Windows vulnerabilities. The Security Fix talks about another in the recent round of expoit attempts and this one comes disguised as junkmail.



The code to exploit the flaw is not written correctly apparently and causes the system to crash. The point of the whole story is this….. Many people (thankfully) have learned to be suspicious of attachments in email. Some still think that unexpected attachments from people they know are ok. THIS is a mistake. Be suspicious of ANY unexpected email attachment. Further be suspicious of ANY link in an email. Especially if you’re using Windows and Internet Explorer (as it is by far most targetted platform/browser at this point.) Many times here on this site I’ve talked about investigating links in suspect emails and visiting sites that were trying to scam people. I take several precautions against infecting a system when I do this. (The main defence being that I run linux instead of Windows.) Don’t play with fire unless you’re prepared to get burned.

Related Posts

Blog Traffic Exchange Related Posts
  • WMF 0-day exploit There seems to be a 0-day exploit involving WMF (Windows Meta File's) according to SANS. Here's their lead-in Just when we thought that this will be another slow day, a link to a working unpatched exploit in, what looks like Windows Graphics Rendering Engine, has been posted to Bugtraq. It's......
  • The junk that you will find in web access logs If you have a website, you likely will look at your logs from time to time to see just who or how many people are visiting your site. I've certainly looked at a lot of logfiles both for my site and for others and thought I'd pass along some things......
  • Lotus Notes WMF vulnerability This is really the same zero-day wmf vulnerability, but there is a twist. It's been found that Lotus Notes v. 6.x and up are vulnerable to the Windows Meta File (WMF) exploit that's making the rounds. Probably not surprising given that there are reports of many vectors of attack, not......
Blog Traffic Exchange Related Websites
  • Top 10 Ways To Get People To Link To Your Web Site! 1. Offer other web sites free content to post on their web site. Include your link on all of your content. The content should relate to your web site because it will be in front of your target audience. 2. When you visit a web site you've enjoyed a lot,......
  • Valuable Benefits From Link Building Services Building the links for your online firm would be a hard task to manage, although you don't require to do this all alone as you merely frequently choose different alternative such as paying firm that provides link building services. Generally, mentioning of constructing the backlinks, it probably fit into the......
  • Your List Building Project – Simple Mistakes That Can Destroy It For those of you who know a lot about marketing online, you are probably familiar with the saying “lists will get you cash”. Leading online marketers are always teaching their students that creating focused email lists of potential members is essential. And the fact is, yes this is the holy......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site