Junk mail can be REALLY nasty



As if you needed another reason to not like SPAM ( no, not the hormel product, we’re talking junk mail here.) A couple days ago I mentioned a post at the sans institute talking about an email that was circulating and the link within that email took you to a malicious site (redirected) and attempted to exploit one of the recently disclosed Windows vulnerabilities. The Security Fix talks about another in the recent round of expoit attempts and this one comes disguised as junkmail.



The code to exploit the flaw is not written correctly apparently and causes the system to crash. The point of the whole story is this….. Many people (thankfully) have learned to be suspicious of attachments in email. Some still think that unexpected attachments from people they know are ok. THIS is a mistake. Be suspicious of ANY unexpected email attachment. Further be suspicious of ANY link in an email. Especially if you’re using Windows and Internet Explorer (as it is by far most targetted platform/browser at this point.) Many times here on this site I’ve talked about investigating links in suspect emails and visiting sites that were trying to scam people. I take several precautions against infecting a system when I do this. (The main defence being that I run linux instead of Windows.) Don’t play with fire unless you’re prepared to get burned.

Related Posts

Blog Traffic Exchange Related Posts
  • Clamav and Firefox updates In the last couple days there have been new security releases of both clamantivirus (0.88.2 is now the current) and Mozilla-Firefox (1.0.3 is the current release over there). If you use either of these programs you should be looking to update. I've been busy looking at getting src.rpm's recompiled here......
  • The junk that you will find in web access logs If you have a website, you likely will look at your logs from time to time to see just who or how many people are visiting your site. I've certainly looked at a lot of logfiles both for my site and for others and thought I'd pass along some things......
  • Modern Computer Viruses are almost NEVER from whom they claim to be from This is one that I've probably talked about before, but it's worth rehashing because of a call I had this afternoon. A customer had been receiving phone calls and email messages from folks asking that he stop sending them a virus. Essentially all of the viruses were claiming to be......
Blog Traffic Exchange Related Websites
  • Corporate Blogging Link Building Strategies An important part of promoting your corporate blog is making sure that you have plenty of good inbound links coming into your site. This can help increase your overall popularity, as well as how search engines rank your site. While there are some methods of building links that promise the......
  • Avoiding Phishing Phishing is defined as the practice of using fraudulent e-mails and fake duplications of legitimate websites to extract financial data from computer users for purposes of identity theft. Imagine one morning waking up and doing your daily routines, you check your email and see that an email from your bank,......
  • Valuable Benefits From Link Building Services Building the links for your online firm would be a hard task to manage, although you don't require to do this all alone as you merely frequently choose different alternative such as paying firm that provides link building services. Generally, mentioning of constructing the backlinks, it probably fit into the......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site