Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security experts warn us users again.

Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links.

Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like:

"Osama bin Laden caught",
"Saddam Hussein has died",
"Michael Jackson tried to commit suicide".

Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click.

These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait.

One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A

On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in.

Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves.

It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future.

So, it's better not to learn any news from e-mail messages. Try to resist the temptation to open email with some REALLY BREAKING NEWS.

Don't open, don't click. And patch your browser.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More