Junk mail can be REALLY nasty



As if you needed another reason to not like SPAM ( no, not the hormel product, we’re talking junk mail here.) A couple days ago I mentioned a post at the sans institute talking about an email that was circulating and the link within that email took you to a malicious site (redirected) and attempted to exploit one of the recently disclosed Windows vulnerabilities. The Security Fix talks about another in the recent round of expoit attempts and this one comes disguised as junkmail.



The code to exploit the flaw is not written correctly apparently and causes the system to crash. The point of the whole story is this….. Many people (thankfully) have learned to be suspicious of attachments in email. Some still think that unexpected attachments from people they know are ok. THIS is a mistake. Be suspicious of ANY unexpected email attachment. Further be suspicious of ANY link in an email. Especially if you’re using Windows and Internet Explorer (as it is by far most targetted platform/browser at this point.) Many times here on this site I’ve talked about investigating links in suspect emails and visiting sites that were trying to scam people. I take several precautions against infecting a system when I do this. (The main defence being that I run linux instead of Windows.) Don’t play with fire unless you’re prepared to get burned.

Related Posts

Blog Traffic Exchange Related Posts
  • Modern Computer Viruses are almost NEVER from whom they claim to be from This is one that I've probably talked about before, but it's worth rehashing because of a call I had this afternoon. A customer had been receiving phone calls and email messages from folks asking that he stop sending them a virus. Essentially all of the viruses were claiming to be......
  • Virus Hoaxes are almost as bad as real viruses I suspect you've probably got a fair share of these, I know I pull my hair out everytime I see someone forward one to their closest 400 friends and include me. Virus warnings. Viruses, are something that I deal with cleaning up quite a bit and I guess people try......
  • Lotus Notes WMF vulnerability This is really the same zero-day wmf vulnerability, but there is a twist. It's been found that Lotus Notes v. 6.x and up are vulnerable to the Windows Meta File (WMF) exploit that's making the rounds. Probably not surprising given that there are reports of many vectors of attack, not......
Blog Traffic Exchange Related Websites
  • Top 10 Ways To Get People To Link To Your Web Site! 1. Offer other web sites free content to post on their web site. Include your link on all of your content. The content should relate to your web site because it will be in front of your target audience. 2. When you visit a web site you've enjoyed a lot,......
  • Busting Punks (and Personal Finance Links) My wife and I enjoy watching The Good Guys on Fox. I got sucked in by Tom Hank's son, Colin's, amazing likeness to his dad. However, the real star of the show is Bradley Whitford. His character, Dan Stark, is a throwback from the 70's. It's not likely to win......
  • Your List Building Project – Simple Mistakes That Can Destroy It For those of you who know a lot about marketing online, you are probably familiar with the saying “lists will get you cash”. Leading online marketers are always teaching their students that creating focused email lists of potential members is essential. And the fact is, yes this is the holy......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site