What's Homer's PSA's? A PSA is a Public Service Announcement. In this thread I will be posting information about the latest internet scams. I hope you all find the information useful.
Here's the first one.....
February 23, Potomac News (MD) - Fake Social Security site part of scam.
As consumers become savvier to such "phishing" scams, scammers are creating more complex ways of gaining personal information including bank account, Social Security and personal identification numbers. The Social Security Administration (SSA) is warning people about a recent e-mail that asked for personal information through a link to a site that replicates a slightly altered version of its official Website. "What was unique about this situation was that when you clicked on the link, it took you to a clone of [SSA's] Website," said Mark Lassiter, SSA spokesperson. The government agency found out about the scam Friday, February 17 from people who were unsure if the e-mail was a legitimate request, Lassiter said. The e-mail in this case shared neither the www.ssa.gov or the www.socialsecurity.gov URL that Lassiter said are used to access the official Website. Social Security is not known to make many press releases, Lassiter said, but added that the severity of the situation warranted a quick turn-around. "We released the information within a couple hours of finding out," he said.
Thanks Homer and I think this is a great new Topic. It will be very helpful to all of us. O0 O0
As you can see from the article below, disposing of your old computer can expose you to identity theft. To be safe you need to remove the hard drive and destroy it with a hammer. If you want to sell the computer with the hard drive still in it you will have to buy a military grade disk wiper program for about $30. Second-hand computers pose identity theft threat. A new identity theft study conducted by University of Leicester criminologist Professor Martin Gill found that second-hand computers -- which account for one in 12 computers in use worldwide -- can be a potential treasure trove of personal information -- putting users at risk of fraud and identity theft. The researchers purchased six used computers and conducted a forensic data analysis on each. Half of the computers had in fact not been securely wiped. In one case there had been no attempt to wipe the contents whatsoever. Gill said, "The fact that we found so much personal information through a focused study indicates that the potential for fraud and identity theft from the second hand PC market is huge...Simply re-formatting a hard drive is not enough to make data irretrievable. Anyone disposing of a personal computer must ensure that all data is securely wiped using specialist software to wipe over every sector of the hard drive." Among the data retrieved included: bank account details; correspondence with a bank noting change of e-mail address; sensitive information, including a spreadsheet which contained details of creditors, payroll, and the names and addresses of past and present business customers.
Good idea Homer, thanks for the info and the new topic. ;)
Quote from: Homer on March 02, 2006, 11:40:20 AM
As you can see from the article below, disposing of your old computer can expose you to identity theft. To be safe you need to remove the hard drive and destroy it with a hammer. If you want to sell the computer with the hard drive still in it you will have to buy a military grade disk wiper program for about $30. Second-hand computers pose identity theft threat. A new identity theft study conducted by University of Leicester criminologist Professor Martin Gill found that second-hand computers -- which account for one in 12 computers in use worldwide -- can be a potential treasure trove of personal information -- putting users at risk of fraud and identity theft. The researchers purchased six used computers and conducted a forensic data analysis on each. Half of the computers had in fact not been securely wiped. In one case there had been no attempt to wipe the contents whatsoever. Gill said, "The fact that we found so much personal information through a focused study indicates that the potential for fraud and identity theft from the second hand PC market is huge...Simply re-formatting a hard drive is not enough to make data irretrievable. Anyone disposing of a personal computer must ensure that all data is securely wiped using specialist software to wipe over every sector of the hard drive." Among the data retrieved included: bank account details; correspondence with a bank noting change of e-mail address; sensitive information, including a spreadsheet which contained details of creditors, payroll, and the names and addresses of past and present business customers.
Wow, this one is very interesting!! Thanks so much.
February 27, SC Magazine - FTC game teaches auction lessons.
The Federal Trade Commission (FTC) announced the launch of "Auction Action," a point-based game that teaches consumers about online fraud. The game scores users on how successfully they can answer questions about online auctions. The agency said, âEURoeIn 2005, the FTC received 20,450 complaints related to Internet auctions, or about 12 percent of the total number of complaints, making it the second-most common kind of complaint after those about identity theft...The new Website explains how Internet
auctions work, the pros and cons of using different payment options and how -- as a buyer or seller -- you can avoid the most common types of fraud." Game: http://www.onguardonline.gov. Source: http://www.scmagazine.com/uk/news/article/543501/ftc-game-teaches-auction-lessons/
Quote from: Bree on March 02, 2006, 11:39:33 AM
Thanks Homer and I think this is a great new Topic. It will be very helpful to all of us. O0 O0
Your welcome. "An ounce of prevention is worth a pound of cure!" O0
Quote from: Homer on March 02, 2006, 11:43:20 AM
February 27, SC Magazine - FTC game teaches auction lessons.
The Federal Trade Commission (FTC) announced the launch of "Auction Action," a point-based game that teaches consumers about online fraud. The game scores users on how successfully they can answer questions about online auctions. The agency said, âEURoeIn 2005, the FTC received 20,450 complaints related to Internet auctions, or about 12 percent of the total number of complaints, making it the second-most common kind of complaint after those about identity theft...The new Website explains how Internet
auctions work, the pros and cons of using different payment options and how -- as a buyer or seller -- you can avoid the most common types of fraud." Game: http://www.onguardonline.gov. Source: http://www.scmagazine.com/uk/news/article/543501/ftc-game-teaches-auction-lessons/
All very interesting reading and a wealth of knowledge. spb.gif
Symantec Offers Free Online Threat Meter
Jack M. Germain, newsfactor.com Thu Mar 2, 2:00 PM ET
It is difficult enough for seasoned computer pros to keep on top of the alarming number of Internet threats plaguing PCs these days. Those new to the world of computing face a seemingly impossible task in trying to stay informed and keep their computers free of harmful and annoying intrusions.
But now computer users have a free tool to help keep them apprised of the latest threats from worms, hackers, and malicious software.
Symantec, a provider of computer security products, has launched Threat Meter, an online tool that promises to provide up-to-date information on the risk levels associated with e-mail, Web activities, instant messaging, and file-sharing.
Increased Insecurity
According to a recent survey conducted by the Cyber Security Industry Alliance, more computer users are becoming increasingly insecure about using the Internet. Forty-eight percent of those surveyed avoid making purchases on the Internet because they are afraid their financial information might be stolen.
"Consumers should feel confident about their security when they are online, whether they are communicating via e-mail, conducting financial transactions on the Internet, chatting over instant messaging, or sharing files," said Arthur Wong, vice president of Symantec Security Response and Managed Security Services.
He said the Threat Meter will offer users an essential, regularly updated resource they can check daily for the latest information about online threats.
"Just as prepared travelers check the weather forecast for their destination city, consumers who are online also should have a tool they can use to help them prepare for a safe and productive experience on the Internet," he said.
Metering Online Safety
The Threat Meter pulls from Symantec's global network that the company's Security Response team uses to track new Internet threats. This global team is staffed by intrusion experts, security engineers, virus hunters, threat analysts, and technical-support teams that work in tandem to provide security intelligence for businesses and consumers.
The Threat Meter rates the four main online activities -- e-mail, Web activities, instant messaging, and file-sharing -- as low, medium, or high risk. The meter, which is displayed as a multicolor chart, offers an at-a-glance update on the status of the four most common uses for computers in the home.
This week, for example, the Threat Meter showed e-mail threats to be at low risk and urged consumers to use basic caution in opening e-mail attachments. "Currently, no widespread outbreaks of malicious code are circulating via e-mail," the chart noted.
In addition, the Threat Meter is indicating this week that Web activities are at medium risk, which suggests that computer users should exercise extra caution. According to the Threat Meter, several recent vulnerabilities exist in Apple's Safari Web browser. Also, attackers currently are targeting weaknesses in Microsoft's Internet Explorer Web browser.
"Simply browsing to a malicious Web site could trigger a problem," warned the meter.
**************************************************************
Here's a link to Symantec's threat center:
http://www.symantec.com/avcenter/home_homeoffice/index.html
very interesting.thanks homer. :)
Your welcome. I will be posting more of them as I become aware of them. O0
Quote from: Homer on March 02, 2006, 11:40:20 AM
As you can see from the article below, disposing of your old computer can expose you to identity theft. To be safe you need to remove the hard drive and destroy it with a hammer.
This one made me laugh out loud...Mr. Foxx and I owned an "EffMachines" PC which crashed. We knew we had to really destroy it in order to make it safe from ID theives...
Cracked it open with a sledge.
Took the drill to it.
Took a hammer to it.
Snipped all the wires. Burnt them with a propane torch.
Jumped on it.
Finally, took the Sawzall to it and shredded it up good.
It's a fun way to get out a little aggression. ;)
I have had great success with my current emachines pc. Been close to 3 years now and still runs like a champ. O0
Quote from: foxx on March 02, 2006, 03:37:50 PM
Quote from: Homer on March 02, 2006, 11:40:20 AM
As you can see from the article below, disposing of your old computer can expose you to identity theft. To be safe you need to remove the hard drive and destroy it with a hammer.
This one made me laugh out loud...Mr. Foxx and I owned an "EffMachines" PC which crashed. We knew we had to really destroy it in order to make it safe from ID theives...
Cracked it open with a sledge.
Took the drill to it.
Took a hammer to it.
Snipped all the wires. Burnt them with a propane torch.
Jumped on it.
Finally, took the Sawzall to it and shredded it up good.
It's a fun way to get out a little aggression. ;)
Sounds like you had some fun. Next time I need to get rid of a computer, I'll come and see you!!
Quote from: Homer on March 02, 2006, 03:43:28 PM
I have had great success with my current emachines pc. Been close to 3 years now and still runs like a champ. O0
Loved mine for the first 3 years too Homer... ;) About 6 months later...Kerplunk.
I think one of the things I loved the most was being able to put my flash memory card right into it's own slot to download my digital pics. No more damn wires. LOL O0
yes this topic is well worth posting thanks homer
Thanks Homey for always watching out for us! O0
Quote from: Homer on March 02, 2006, 03:52:25 PM
I think one of the things I loved the most was being able to put my flash memory card right into it's own slot to download my digital pics. No more damn wires. LOL O0
Loved that about it too....Our E(ff)machines was actually kinda top-of-the-line store bought PC when we got it...It had an 80gig hardrive which was just unheard of back then...That's actually why we bought it...but I think it also was the source of its demise... :'(
lol emachines went downhill fast.
just wanted to let everyone know that there's a new email out trying to phish your paypal info and the link looks really legitimate. NEVER NEVER click on links in email. My dad and I both got the same email yesterday... I forwarded mine to the paypal fraud people. My dad doesn't even have a paypal account :))
If you do ebay you get the same crap...I get them for ebay and paypal all the time...I just send to spoof@ebay or spoof@paypal....but they still come....just remember they will never ask you for personal information in a email
I got both of those e mails.and we don't have paypal account either.. and I"ve reported the e-bay one to a live tech one evening. So beware folks
March 21, eWeek - Spyware trail leads to Kazaa, big advertisers.
The StopBadware.org coalition, funded by Google, has listed the Kazaa
file? sharing application at the top of a list of noxious software programs
that present a threat to business and consumer users. The coalition, which
counts Sun Microsystems and Lenovo among its sponsors, will recommend in
its inaugural Badware Report that users stay away from Kazaa and three
other programs that can be combined with Trojans and bots for use in data
theft attacks. Adware and spyware programs that come bundled with
peer?to?peer applications present a huge security risk to corporate
networks, and StopBadware.org says Kazaa's claim to be spyware?free cannot
be trusted. In addition to Kazaa, StopBadware.org said computer users
should stay away SpyAxe, a rogue anti?spyware program; MediaPipe, a
download manager that offers access to media content; and Waterfalls 3, a
screensaver utility. StopBadware.org
I hate to admit just how computer illiterite I am but the only thing i recognized in Homer's PSA were the words "Sun Microsoft". Is this a warning to get rid of it and if so, how do we do that? Again. sorry for being so stupid! :-\
Don't call yourself stupid PogoSlave! I think that you are okay as long as you haven't ever downloaded from kazaa...
...and Don't delete Sun Microsystems...that's Java and you need that to play games!
Thanks Foxx!
Thanks alot as always:) ee2.1.gif
You're welcome PogoSlave! r1.gif
It mentions Sun because they are one of the sponsors of the website www.stopbadware.org
well my computer
is kicking the bed my sludge hammer is coming out hmm nice operation
I will remove the hard drive and do a research great information homer
Thanks O0
April 11, IT Observer - Web Rebates program a security risk for computer
users. Security experts at MicroWorld Technologies are stating that a new
variant of the "WebRebates" program, "Win32.WebRebates.s," is a serious
security risk for computer users. WebRebates claims to offer rebates and
discounts when purchasing items on Internet, however it's found to be a
Spyware, Adware and a security hazard in many ways. This program monitors
browser activity and other operations on your PC. It also pesters your
computer with annoying pop-ups, apart from clogging your mailbox with
spam.
WebRebates comes bundled with many software utilities. Once installed, it
tries to get additional malware from a series of Websites.
thanks for posting homer
oh hey...LOL thought I'd share this. I had some guy from Nigera contact me and say he needed money to come back to the states blah blah.....he asked if I could come down there to help him get a passport. I worte back and said sure, but only if my friends Mr. Spock and Pavel Chekov could come with me. I signed the email as Jean-Luke Picard. He wrote back saying he couldn't afford to send me money to come down there but I told him I'd pick him up at the airport in Salt Lake City ( very far away from where I actually live and no way in heck was I going to meet him anyway.) I told him after he got out of customs, to wear all yellow and a green hat and to flap his arms like a chicken and squeal like a pig so I would know it was him. He wrote back saying I was crazy and he no longer needed my help-however was Mr. Spock and Pavel Chekov willing to help him? It's been two weeks now and not a word from him. :))
Quote from: bubblegum on April 22, 2006, 11:32:49 AM
oh hey...LOL thought I'd share this. I had some guy from Nigera contact me and say he needed money to come back to the states blah blah.....he asked if I could come down there to help him get a passport. I worte back and said sure, but only if my friends Mr. Spock and Pavel Chekov could come with me. I signed the email as Jean-Luke Picard. He wrote back saying he couldn't afford to send me money to come down there but I told him I'd pick him up at the airport in Salt Lake City ( very far away from where I actually live and no way in heck was I going to meet him anyway.) I told him after he got out of customs, to wear all yellow and a green hat and to flap his arms like a chicken and squeal like a pig so I would know it was him. He wrote back saying I was crazy and he no longer needed my help-however was Mr. Spock and Pavel Chekov willing to help him? It's been two weeks now and not a word from him. :))
Are you in left field or right field? :))
Quote from: Tara on April 22, 2006, 11:34:21 AM
Quote from: bubblegum on April 22, 2006, 11:32:49 AM
oh hey...LOL thought I'd share this. I had some guy from Nigera contact me and say he needed money to come back to the states blah blah.....he asked if I could come down there to help him get a passport. I worte back and said sure, but only if my friends Mr. Spock and Pavel Chekov could come with me. I signed the email as Jean-Luke Picard. He wrote back saying he couldn't afford to send me money to come down there but I told him I'd pick him up at the airport in Salt Lake City ( very far away from where I actually live and no way in heck was I going to meet him anyway.) I told him after he got out of customs, to wear all yellow and a green hat and to flap his arms like a chicken and squeal like a pig so I would know it was him. He wrote back saying I was crazy and he no longer needed my help-however was Mr. Spock and Pavel Chekov willing to help him? It's been two weeks now and not a word from him. :))
Are you in left field or right field? :))
I really don't think this guy caught the star trek references. Next time, if there is one, I'm going to go for star wars references.
I'm so far in left field I'll fall over if the wind blows right :))
Quote from: Homer on April 22, 2006, 11:14:27 AM
April 11, IT Observer - Web Rebates program a security risk for computer
users. Security experts at MicroWorld Technologies are stating that a new
variant of the "WebRebates" program, "Win32.WebRebates.s," is a serious
security risk for computer users. WebRebates claims to offer rebates and
discounts when purchasing items on Internet, however it's found to be a
Spyware, Adware and a security hazard in many ways. This program monitors
browser activity and other operations on your PC. It also pesters your
computer with annoying pop-ups, apart from clogging your mailbox with
spam.
WebRebates comes bundled with many software utilities. Once installed, it
tries to get additional malware from a series of Websites.
Do you have any advise about the best spyware protection to use... I use
SpyBot and WeBroot, Spy Sweeper. So, can either of these control the attack of the above... I have gotten rid of web rebate...had that b4.
Quote from: bubblegum on April 22, 2006, 11:32:49 AM
oh hey...LOL thought I'd share this. I had some guy from Nigera contact me and say he needed money to come back to the states blah blah.....he asked if I could come down there to help him get a passport. I worte back and said sure, but only if my friends Mr. Spock and Pavel Chekov could come with me. I signed the email as Jean-Luke Picard. He wrote back saying he couldn't afford to send me money to come down there but I told him I'd pick him up at the airport in Salt Lake City ( very far away from where I actually live and no way in heck was I going to meet him anyway.) I told him after he got out of customs, to wear all yellow and a green hat and to flap his arms like a chicken and squeal like a pig so I would know it was him. He wrote back saying I was crazy and he no longer needed my help-however was Mr. Spock and Pavel Chekov willing to help him? It's been two weeks now and not a word from him. :))
Bubble, that is extremely hilarious. I like they way you handled him!! Good job. :)) O0
Quote from: Tokenstokenstokens on April 22, 2006, 11:36:23 AM
Quote from: Homer on April 22, 2006, 11:14:27 AM
April 11, IT Observer - Web Rebates program a security risk for computer
users. Security experts at MicroWorld Technologies are stating that a new
variant of the "WebRebates" program, "Win32.WebRebates.s," is a serious
security risk for computer users. WebRebates claims to offer rebates and
discounts when purchasing items on Internet, however it's found to be a
Spyware, Adware and a security hazard in many ways. This program monitors
browser activity and other operations on your PC. It also pesters your
computer with annoying pop-ups, apart from clogging your mailbox with
spam.
WebRebates comes bundled with many software utilities. Once installed, it
tries to get additional malware from a series of Websites.
Do you have any advise about the best spyware protection to use... I use
SpyBot and WeBroot, Spy Sweeper. So, can either of these control the attack of the above... I have gotten rid of web rebate...had that b4.
I never had that program but I use SpySweeper and I have to say in my opinion it's one of the best programs I've used. I've never had an issue with spyware since purchasing this program.
PC Magazine had SpySweeper rated as their #1 spyware program but the downside is it isn't free.
There are 2 other programs that are free that are highly reguarded as well.
Ad-Aware
SpyBot S&D
Now if you choose to go with the free programs I suggest you get them both. When I used them in the past sometimes one program wouldn't find something but the other would.
I suggest you try them all and use what you feel comfortable with. SpySweeper has a free 30 day trial. O0
I forgot to mention that one of the most important things when combatting spyware/viruses etc is to make sure your programs are using the latest definitions. New bugs come out daily so it is important to keep your programs up to date.
Quote from: Homer on April 22, 2006, 12:14:19 PM
I never had that program but I use SpySweeper and I have to say in my opinion it's one of the best programs I've used. I've never had an issue with spyware since purchasing this program.
PC Magazine had SpySweeper rated as their #1 spyware program but the downside is it isn't free.
There are 2 other programs that are free that are highly reguarded as well.
Ad-Aware
SpyBot S&D
Now if you choose to go with the free programs I suggest you get them both. When I used them in the past sometimes one program wouldn't find something but the other would.
I suggest you try them all and use what you feel comfortable with. SpySweeper has a free 30 day trial. O0
I forgot to mention that one of the most important things when combatting spyware/viruses etc is to make sure your programs are using the latest definitions. New bugs come out daily so it is important to keep your programs up to date.
[/quote]
I use spy sweeper and yes... I had to purchase it... I use spybot as a back up search... normally.... they work hand in hand in catchin adware/spyware that the other may have missed.
Although, spybot is free... I actually did not d/l it from the web... I got it from a friend that scanned it for virus... b4 I d/l it... I also scanned it... then installed.
I got web rebates b4 i added spyware protection...
Its absolutely impossible to get or prevent "all spyware" or "adware"... some software programs we use also have adware that programmers find neccessary for various reason to install that is not harmful. (Computer Geek) nah....
aah crap.. I screwed that quote up... lol... sorry Homer...butchered another post... lol
Quote from: Tokenstokenstokens on April 22, 2006, 12:23:10 PM
Quote from: Homer on April 22, 2006, 12:14:19 PM
I never had that program but I use SpySweeper and I have to say in my opinion it's one of the best programs I've used. I've never had an issue with spyware since purchasing this program.
PC Magazine had SpySweeper rated as their #1 spyware program but the downside is it isn't free.
There are 2 other programs that are free that are highly reguarded as well.
Ad-Aware
SpyBot S&D
Now if you choose to go with the free programs I suggest you get them both. When I used them in the past sometimes one program wouldn't find something but the other would.
I suggest you try them all and use what you feel comfortable with. SpySweeper has a free 30 day trial. O0
I forgot to mention that one of the most important things when combatting spyware/viruses etc is to make sure your programs are using the latest definitions. New bugs come out daily so it is important to keep your programs up to date.
I use spy sweeper and yes... I had to purchase it... I use spybot as a back up search... normally.... they work hand in hand in catchin adware/spyware that the other may have missed.
Although, spybot is free... I actually did not d/l it from the web... I got it from a friend that scanned it for virus... b4 I d/l it... I also scanned it... then installed.
I got web rebates b4 i added spyware protection...
Its absolutely impossible to get or prevent "all spyware" or "adware"... some software programs we use also have adware that programmers find neccessary for various reason to install that is not harmful. (Computer Geek) nah....
I use Spy Sweeper all the time. Yes I have a full version (not the 30 day trial). I need to find out when it expires since I've had it since last year. Anyway, I totally endorse this product. I've used Ad-Aware & SpyBot (I think I'm one of the few that did not like SpyBot) and Yahoo! Anti-Spy. Can't complain about the results. I've also used Microsoft AntiSpyware Beta 1 (rare use of a MS Beta software) and I thought it was great. They released Beta 2 and it sucked compared to the 1st one. Anyway, Spy Sweeper is the program to use. For the price, it's a great value. I recommend if you have a few extra dollars to spend (not that anyone does in these gas price days), get this program!
I use Spybot and Adaware..both work super for me..and AVG for anti virus.. all are free.What can I say, I"m cheap! :))
Quote from: nanners on April 22, 2006, 01:56:48 PM
I use Spybot and Adaware..both work super for me..and AVG for anti virus.. all are free.What can I say, I"m cheap! :))
There's nothing wrong with that Nan. If it works for you, that's all that matters. I have Webroot Spy Sweeper. They gave me a huge discount on it when I bought the new computer. That's why I got it, otherwise I might have gone the "free" route!! O0
Quote from: nanners on April 22, 2006, 01:56:48 PM
I use Spybot and Adaware..both work super for me..and AVG for anti virus.. all are free.What can I say, I"m cheap! :))
I have Norton and AVG at work. The firm paid for Norton, and as you said, AVG is free. AVG finds things that Norton doesn't. ;:"
I was told by the dude that hooked my computer up not to use Norton ..Its a system hog and don't catch everything.. So I went to my next best friend ...Google! Found AVG and love it. <3
I'm laughing so hard right now. I got another one of those Nigerian scam email things today. Well, since I already used star trek I thought I'd throw in star wars this time. So before going out to run some errands, I wrote back.
I told him my full name was Princess Leia and my brother Luke and I don't take kindly to scammers. I also told him I have a pet Chewbacca named Ewok and he bites.
I also told him to quit scamming people or the FBI was going to send in the
special forces called the Stormtroopers and they are led by our father Anakin Skywalker and his friend Yoda. :)) :)) :))
He replied fairly quickly saying he was the real deal and he was willing to send me 5% of 10 million dollars if I helped him (yea okay buddy whatever)and he asked how big of a dog a chewbacca is. He also said I should be proud my father works for the government and it must be an honor to have a father in that high of a ranking position.
At this point I don't know if I should humor myself and email him back to see how far along I can string him before he figures out he's getting jack crap out of me.
:)) :)) :))
I've tried playing with their minds to..but all I got was "email undeliverable".. idiots! lol
Bubble, got to love your sense of humor. Is this from the same guy or a different one? It depends on whether or not you want to keep yanking his chain....write back till you get bored with it, lol. :))
Quote from: Helen on April 22, 2006, 04:46:03 PM
Bubble, got to love your sense of humor. Is this from the same guy or a different one? It depends on whether or not you want to keep yanking his chain....write back till you get bored with it, lol. :))
differnt name and differnt email addy so I'm assuming its a different guy. I'll figure out something to tell him. :))
Quote from: bubblegum on April 22, 2006, 04:49:22 PM
Quote from: Helen on April 22, 2006, 04:46:03 PM
Bubble, got to love your sense of humor. Is this from the same guy or a different one? It depends on whether or not you want to keep yanking his chain....write back till you get bored with it, lol. :))
differnt name and differnt email addy so I'm assuming its a different guy. I'll figure out something to tell him. :))
I'd love to hear the next story!!! lol
Nan, doesn't that make ya mad when you want to mess with them and then the email doesn't go through?? :))
BOY! does it ever! I feverishy type some cute comeback only to have it COME BACK! to me! LMAO! Then i'm really mad! The nerve!
April 26, WJACTV 6 (PA) - Pennsylvania bank issues scam warning. First
National Bank (FNB) in Pennsylvania warns that some customers may be the
victims of an e-mail scam. The statement on the bank's Website claims that
someone sent e-mail to some customers stating that an FNB account had been
disabled. The e-mail then asked recipients to click a link. That link took
them to a site which looked like the FNB site, which prompted them for
account numbers. Bank officials aren't sure how many people received the
fraudulent e-mail or how many responded.
Source: http://www.wjactv.com/news/9016499/detail.html?rss=john&psp=news
Homer's extra tip. Never click on these links in your emails. If you need to go to a site do not use the URL in the email. Manually type the official URL in your browser.
thank you homer some of these things i wouldn't have thought of and i use ad-ware it works for.......bubblegum your wit is priceless thanks for laughs :))
Quote from: lostinpogoland on April 28, 2006, 05:11:14 PM
thank you homer some of these things i wouldn't have thought of and i use ad-ware it works for.......bubblegum your wit is priceless thanks for laughs :))
AdAware is a fine program but it will not detect a fraudulent website. That's why I suggest that people type the URL rather than click the links in the email.
i never click the links in e-mails,i did when i 1st starting using computer and kept getting virus but thank you for the advise O0
Thanks for the info Homer. I don't click on anything in emails either. Also, pass on that email to the fraud department of the particular bank....etc. They will check into it and have that ISP investigated. ;)
This is a particularly sophisticated and devious scam
The way it works is you pick up a "Trojan" while cruising the Web. The Trojan sits quietly on your machine until you go to the secure American Express Web Site.
At that point the Trojan pops up a screen to cover the legitimate AMEX Login-in Screen using a technique known as a Browser Helper Object.
The fake screen issues a "Security Alert" which tries to lure the user into entering name, social security number, mother's maiden name and date of birth
In an alert posted on-line the New York-based company included a screenshot of the pop-up. Amex further states "Please note that this fraudulent activity may be the result of a computer virus and is not a part of the American Express website. If you received this pop-up box, your computer may have this virus," the company warned.
The Pop-Up Box looks like this:
(https://img50.imageshack.us/img50/4140/ae0wr.png)
Wow, they're really trying hard to get people to give over personal information. That would have fooled me for sure. Thanks for sharing.
thanx Homer.. I'd never give out ss info anyway.but some things look so real.. :oo
Quote from: SaintHippo on May 05, 2006, 10:36:56 AM
Wow, they're really trying hard to get people to give over personal information. That would have fooled me for sure. Thanks for sharing.
You know you wouldn't of filled that out... Sheesh are you blonde also? :)) :))
Quote from: Tara on May 05, 2006, 03:46:51 PM
Quote from: SaintHippo on May 05, 2006, 10:36:56 AM
Wow, they're really trying hard to get people to give over personal information. That would have fooled me for sure. Thanks for sharing.
You know you wouldn't of filled that out... Sheesh are you blonde also? :)) :))
Well, since the sites I go to for my po.... possible game playing sites don't have any need for my SSN, I think maybe I wouldn't have been fooled by that.
Quote from: SaintHippo on May 05, 2006, 03:48:33 PM
Quote from: Tara on May 05, 2006, 03:46:51 PM
Quote from: SaintHippo on May 05, 2006, 10:36:56 AM
Wow, they're really trying hard to get people to give over personal information. That would have fooled me for sure. Thanks for sharing.
You know you wouldn't of filled that out... Sheesh are you blonde also? :)) :))
Well, since the sites I go to for my po.... possible game playing sites don't have any need for my SSN, I think maybe I wouldn't have been fooled by that.
I don't put my social security number anywhere and if people online don't take Paypal , they don't get my money.
best thing to do when in doubt is to call place of business.better not to take a chance.because these things do look very official Ty homer ;:"
Quote from: Homer on May 05, 2006, 07:05:10 AM
This is a particularly sophisticated and devious scam
The way it works is you pick up a "Trojan" while cruising the Web. The Trojan sits quietly on your machine until you go to the secure American Express Web Site.
At that point the Trojan pops up a screen to cover the legitimate AMEX Login-in Screen using a technique known as a Browser Helper Object.
The fake screen issues a "Security Alert" which tries to lure the user into entering name, social security number, mother's maiden name and date of birth
In an alert posted on-line the New York-based company included a screenshot of the pop-up. Amex further states "Please note that this fraudulent activity may be the result of a computer virus and is not a part of the American Express website. If you received this pop-up box, your computer may have this virus," the company warned.
The Pop-Up Box looks like this:
(https://img50.imageshack.us/img50/4140/ae0wr.png)
Thanks for posting this Homer. ;)
May 22, IDG News Service - Yahoo messaging worm installs bogus browser.
Malware writers have created a new worm that installs a new browser, plays
screeching music and dumps a graphic on the victim's desktop. It starts with
a link to a so-called "Safety Browser" apparently sent by a friend in Yahoo
Inc.'s instant messaging program. Instant messaging security company
FaceTime Communications Inc. described the malware, which it called
"yhoo32.explr", as "insidious" in a security advisory Friday, May 19. The
bug also hijacks Internet Explorer's homepage, directing users to the Safety
Browser's Websit
thanks homer
good to know homer.glad i stay away from yahoo :)
if i dont use a yahoo browser, i dont think this will affect me, correct?
I myself,,use yahoo messenger..but not their browser.and also have yahoo mail..I have had no problems what so-ever *knock on wood*.. I use my webcam with yahoo also..
Quote from: nanners on May 25, 2006, 09:14:15 AM
I use my webcam with yahoo also..
:o
ok i do too, truth be told
Quote from: krispy on May 25, 2006, 08:48:55 AM
if i dont use a yahoo browser, i dont think this will affect me, correct?
Depends on whether or not you clicked the link that installs the bogus browser.
Quote from: Homer on May 25, 2006, 09:28:45 AM
Quote from: krispy on May 25, 2006, 08:48:55 AM
if i dont use a yahoo browser, i dont think this will affect me, correct?
Depends on whether or not you clicked the link that installs the bogus browser.
well i dont click links to add anything so i believe i am ok. ty.
thank you for the warning homer
Company: Hackers can crack top antivirus program
Friday, May 26, 2006; Posted: 12:08 p.m. EDT (16:08 GMT)
WASHINGTON (AP) -- Symantec Corp.'s leading antivirus software, which protects some of the world's largest corporations and U.S. government agencies, suffers from a flaw that lets hackers seize control of computers to steal sensitive data, delete files or implant malicious programs, researchers said Thursday.
Symantec said it was investigating the issue but could not immediately corroborate the vulnerability. If confirmed, the threat to computer users would be severe because the security software is so widely used and because no action is required by victims using the latest versions of Symantec Antivirus to suffer a crippling attack over the Internet.
Symantec has boasted that its antivirus products are installed on more than 200 million computers. A spokesman, Mike Bradshaw, said the company was examining the reported flaw but described it as "so new that we don't have any details."
Researchers from eEye Digital Security Inc. of Aliso Viejo, California, discovered the vulnerability and provided evidence to Symantec engineers this week, said eEye's chief hacking officer, Marc Maiffret. He demonstrated the attack for The Associated Press.
eEye said it appeared consumer versions of Symantec's Norton Antivirus software -- sold at retail outlets around the country -- were not vulnerable to the flaw, though consumers who are provided Symantec's corporate edition antivirus software by their employers for use at home may be affected.
Maiffret's company -- which has discovered hundreds of similar flaws in other software products -- also produces intrusion-protection software, called "Blink," that he said already blocks such attacks and can operate alongside Symantec's antivirus products.
Maiffret published a note about the company's discovery on its Web site but pledged not to reveal details publicly that would help hackers attack Internet users until after Symantec repairs its antivirus software. eEye said it intends to describe the problem in detail privately for some of its largest customers.
"People shouldn't panic," Maiffret said. "There shouldn't be any exploits until a patch is produced."
The reported flaw comes at an awkward time for Symantec. Its chief executive, John Thompson, has campaigned in recent months to convince consumers they should trust Symantec -- not Microsoft Corp. -- to protect their personal information.
Maiffret said eEye's testing showed the problem affects Symantec Antivirus Version 10, including its corporate editions. He said Symantec's consumer antivirus product, known as Norton Antivirus 2006, and its current security suite -- which includes both antivirus and firewall features -- did not appear to be vulnerable.
May 30, Tech Web - Trojan horse BeastPWS-C: The second Trojan to pose as
Microsoft patch. . According to Sophos, the
Trojan horse "BeastPWS-C" starts with a spoofed e-mail from Microsoft that
claims a new vulnerability in the WinLogon Service is out and about.
WinLogon is the log-in service for Windows NT, 2000, and XP. The spammed
message includes a link to a purported patch. Users who click on the URL
actually download the Trojan, not a patch. BeastPWS-C, said Sophos, logs
keystrokes and sends them to a hacker's e-mail account.
A Good Reason to Use Your Credit Card
Scammers have a number of ways to steal from you, but the credit card is losing popularity among the criminal class.
Today, a scammer would rather get access to your bank account number than your credit card.
With the bank account number, he can access your account and take all the money in it. The only disadvantage to the scammer is that the bank account may have very little money in it at the time it's tapped.
That's why some scams require the victim to wire the money to the scammer.
By having victims wire the money, the scammer cuts off any trail once the scam has been discovered. The money cannot be traced and it can't be recovered.
Lately, scammers have discovered PayPal, a company that was set up to facilitate money transfers between buyers and sellers on eBay.
While this is a popular way to make transactions via the internet, legitimate enterprises usually accept checks and credit cards as well.
But PayPal payments can't be traced, since PayPal's policy is to keep all customer records private.
If a deal limits your payment options to direct bank account withdrawal, wire transfer, or PayPal, chances are good it's a scam.
wow thanks for the info. I have my old computer just sitting waiting for a new home. Did not think to take out hard drive. Homer saves the day!!!! u still like ur cakie?
Tell Your Kids:
New IM worm targets MySpace users. Security teams have discovered a new instant messenger (IM)-based phishing attack aimed at users of the popular social networking site MySpace. The scam begins when AOL IM users receive a hyperlink promising new photos from someone in their contact list. But clicking the link leads the victim to a bogus California-based Website that spoofs the MySpace.com log-in page, according to a Websense Security Labs alert. The fraudulent site captures MySpace usernames and passwords, and then forwards users to the real site.
Local Bank Scam:
Fox Chase Bank. Websense Security Labs has received reports of a new phishing attack that targets customers of Fox Chase Bank. Users receive a spoofed e-mail, which claims that recent security improvements to the bank's servers require users to verify their account information.
The "New Coke" Scam
June 19, VNUNet - ID thieves purport Coke l.o.t.t.e.r.y win. Security experts have
published details of a newly discovered e-mail-based fraud that tries to
ensnare recipients with a bogus notification purporting to be a l.o.t.t.e.r.y win
from Coca-Cola. The e-mails, which have the subject line 'Coca Cola
Promotion', have been spammed out to Internet users claiming that the
recipient has won $2.5m in a l.o.t.t.e.r.y held by the soft drinks firm earlier
this month. The recipient is told that they are one of 50 lucky winners
around the world selected randomly after computers found their e-mail
address on Internet Websites. To collect their winnings, people are told to
call, phone, or fax an agent who claims to be working on behalf of
Coca-Cola. However, security firm Sophos warned that the spam is a ruse to
steal personal details, and that the scammers can use the information to
steal money from bank accounts and commit identity fraud.
June 16, Sophos - Spammed Trojan claims Bush/Blair Middle East oil cover-up.
Sophos has warned of a Trojan horse that has been spammed out to e-mail
addresses disguised as a message claiming that George W. Bush and Tony Blair
are conspiring with oil companies to push up petrol prices. Other disguises
being used by the hackers to distribute the Trojan horse include news
reports that Osama Bin Laden has been killed or Michael Jackson has
committed suicide, CCTV photos of an alleged university rapist, and requests
for a photograph to be approved for a magazine. The Troj/Stinx-W Trojan
horse has been spammed out in e-mail messages, which can have a variety of
subject lines including "Petrol Price Conspiracy," "Campus Student Raped,"
or "Bush and Blair Conspire.
thanks for posting.
June 21, Websense Security Labs - Malicious Code Alert: SMS lures for Trojan
bot. Websense Security Labs has received reports of users being lured to
install malicious code via Short Message Service (SMS) messages (also known
as text messages). Victims receive an SMS message on their mobile phone,
thanking them for subscribing to a fictitious dating service. The message
states that the subscription fee of $2.00 per day will be automatically
charged to their cell phone bill until their subscription is cancelled at
the online site. Users who visit the site to unsubscribe from the service
are prompted to download a Trojan bot. The site does not attempt to exploit
any vulnerabilities; instead, the attacker provides instructions to bypass
the Internet Explorer security warning prompt. This bot is Dumador variant
and is controlled by the Webbased HTTP controller.
Peer-to-peer (P2P) networks such as Limewire, Kazaa, Grokster, and others aren't helping
to quell the increase in crimes committed via the Internet. The Internet
cultivates careless and ignorant use of P2P applications as a major part of
the current identity theft problem. People who use P2P applications to
download music, software, and photos may leave themselves wide open to
identity theft by simply being unaware of their computer settings. "One
woman's credit-card information was found in such disparate places as Troy,
MI, Tobago, and Slovenia. Why? We found that the "shared" folder in her
music-downloading application was in fact making readily available her
entire "My Documents" folder to that app's entire P2P audience, 24 hours per
day," Schmidt said. By typing in common search terms such as "bank May
statement," or "stop payment" in Limewire's search function, personal
information is often getting into the wrong hands, enabling cyber-looting.
To bad I don't understand a word you said, I use Limewire.
It means you may be unknowingly giving strangers access to your personal info.
The only thing I have checked which I share is the file/folder that my music is in. That's all anyone can see or rather suppose to be able to see. :(
Quote from: Tara on June 26, 2006, 09:25:39 AM
The only thing I have checked which I share is the file/folder that my music is in. That's all anyone can see or rather suppose to be able to see. :(
We found that the "shared" folder in her
music-downloading application was in fact making readily available her
entire "My Documents" folder to that app's entire P2P audience, 24 hours per
day," Schmidt said. By typing in common search terms such as "bank May
statement," or "stop payment" in Limewire's search function, personal
information is often getting into the wrong hands, enabling cyber-looting.
Yikes! I use Limewire but I don't have a cc or bank account so I really don't have much presonal info on this thing LOL
My music is not even on the same drive as my documents are, but my bank account info isn't in there so I don't know.
if you have a good anti spyware program it detects all that junk.
Quote from: hades on June 27, 2006, 11:00:14 PM
if you have a good anti spyware program it detects all that junk.
And by good, it doesn't mean Norton Antivirus... that program doesn't work at all. I had that on my old computer and got SpySheriff virus, which is really, really nasty.
If you want a good one, try avast! Virus Recovery Database Generator and On-Access Scanner.
http://www.avast.com and download the free home version.
*edit: You should probably do a deep-registry scan too once you get it.
IT security watchers have warned of a Trojan -- Kukudro-A -- that is being propagated
via an infected Microsoft Word document in spammed e-mails, which promise
information about Apple, HP and Sony laptop computers for sale. When opened
the Word document attempts to install another Trojan horse -- Kuku-A -- onto
the user's hard drive. The spam comes with a variety of subject lines
including "worth to see," "prices," and "Hello."
i spam all that type of mail.
http://www.pcworld.com/news/article/0,aid,126313,tk,nl_dnxnws,00.asp
Microsoft Hit With Second Lawsuit Over WGA
Class-action suit filed in Seattle alleges Windows Genuine Advantage is spyware.
Jeremy Kirk, IDG News Service
Wednesday, July 05, 2006
Microsoft has been hit with a second lawsuit over Windows Genuine Advantage, its antipiracy program that checks if the Windows operating system on a machine has a valid license.
The class-action suit was filed Friday in U.S. District Court in Seattle, just four days after the first one. The new suit lists its plaintiff as Engineered Process Controls and Univex, along with citizens Edward Misfud, David DiDomizio, and Martin Sifuentes, who are listed as owners of licensed copies of Windows XP running WGA.
Microsoft Accused of Misleading Customers
The suit alleges WGA is spyware and that Microsoft mislead consumers by labeling it as a critical security update. The plaintiffs maintain Microsoft did not make users aware that WGA frequently contacted its central servers.
"WGA gathers data that can easily identify individual PCs, and WGA can be modified remotely to collect additional information at Microsoft's initiation," according to the filing.
WGA collects a computer's IP address, BIOS data, system version and local language and settings information, the suit says.
Company Tries to Placate Users
Microsoft acknowledges WGA collects hardware and software data but maintains it is only used to verify that only one copy of an OS has been registered on one computer. If Microsoft finds a discrepancy, WGA can notify users their OS may be unlicensed through pop-up warnings.
Users have complained WGA is flawed, identifying legitimate copies of an OS as fraudulent. Microsoft blocks the download of some programs but allows security patches if an OS is judged to be invalid.
Last week, Microsoft changed some features of WGA, including adding an option that let users turn off warnings that their OS may be invalid and the frequency with which WGA communicated with its servers.
The suit asks for compensation and for Microsoft to warn users of the risks of WGA and produce a tool to remove it.
wonder if theyll attempt fixing it anytime soon.
Trojan horse masquerades as message of love. An email attachment
containing a number of loosely philosophical ponderings on the art of love
is threatening businesses and home computer users across the world. This
latest online attack contains a malicious Microsoft PowerPoint file that
is able to exploit an unpatched vulnerability in the software. The file
contains exploit code that drops the Troj/EdepolC keylogging Trojan,
which in turn allows the hacker to spy on computer users. This
particularly irritating Trojan horse also tries to disable antivirus
products running on the infected computer, which only aggravates the
threat.
Quote from: Homer on July 19, 2006, 05:39:20 PM
Trojan horse masquerades as message of love. An email attachment
containing a number of loosely philosophical ponderings on the art of love
is threatening businesses and home computer users across the world. This
latest online attack contains a malicious Microsoft PowerPoint file that
is able to exploit an unpatched vulnerability in the software. The file
contains exploit code that drops the Troj/EdepolC keylogging Trojan,
which in turn allows the hacker to spy on computer users. This
particularly irritating Trojan horse also tries to disable antivirus
products running on the infected computer, which only aggravates the
threat.
:o Is it called "Message of Love"?
I don't even click on anything, unless I know who its from.
Quote from: ~Ãutolovér~ on July 19, 2006, 05:45:58 PM
Quote from: Homer on July 19, 2006, 05:39:20 PM
Trojan horse masquerades as message of love. An email attachment
containing a number of loosely philosophical ponderings on the art of love
is threatening businesses and home computer users across the world. This
latest online attack contains a malicious Microsoft PowerPoint file that
is able to exploit an unpatched vulnerability in the software. The file
contains exploit code that drops the Troj/EdepolC keylogging Trojan,
which in turn allows the hacker to spy on computer users. This
particularly irritating Trojan horse also tries to disable antivirus
products running on the infected computer, which only aggravates the
threat.
:o Is it called "Message of Love"?
I don't even click on anything, unless I know who its from.
It could be called anything I imagine. My general rule is if it came from someone I don't know it doesn't even get opened. It goes *PLONK* right into the trash. Attachments should never be opened without being scanned by a reliable software package first.
Quote from: Mr. Scandalous on June 28, 2006, 01:36:04 AM
Quote from: hades on June 27, 2006, 11:00:14 PM
if you have a good anti spyware program it detects all that junk.
And by good, it doesn't mean Norton Antivirus... that program doesn't work at all. I had that on my old computer and got SpySheriff virus, which is really, really nasty.
If you want a good one, try avast! Virus Recovery Database Generator and On-Access Scanner.
http://www.avast.com and download the free home version.
*edit: You should probably do a deep-registry scan too once you get it.
I have had this program for 2yrs now and I love it and best this of all its free!!! unless you love it as much as I do!!
Who would be stupid or careless enough to put that sort of information in their shared folder? Geez, these people need not have a computer. lol
many people are stupid enough to do it.
Quote from: EyeCu on July 19, 2006, 07:05:09 PM
Who would be stupid or careless enough to put that sort of information in their shared folder? Geez, these people need not have a computer. lol
Using the quote feature that is available in this forum, would be a good idea ,it helps people know who or what you are talking about, without having to go back 10 pages to try and work it out.
*Hint Hint* O0 :/\
Quote from: ~Ãutolovér~ on July 20, 2006, 05:47:51 PM
Quote from: EyeCu on July 19, 2006, 07:05:09 PM
Who would be stupid or careless enough to put that sort of information in their shared folder? Geez, these people need not have a computer. lol
Using the quote feature that is available in this forum, would be a good idea ,it helps people know who or what you are talking about, without having to go back 10 pages to try and work it out.
*Hint Hint* O0 :/\
Thank you! I'm glad I'm not the only one that is driven crazy by that. I've already read half the friggin' thread, and now I have to go BACK and read it again and try to figure out what people are talking about? No. I don't think so. Posts without quotes will henceforth be ignored.
And Hades? You KNOW better. :oo
IRS Warns Taxpayers of E-Mail Scam Using US Treasury Payment Systems
Fake e-mail messages containing several misspellings and purporting to
be from a fictitious IRS organization are circulating. They claim that
someone has enrolled the recipient's credit card in the US Treasury's
Electronic Federal Tax Payment System and has tried to use the credit
card to pay taxes. The messages instruct recipients to click on a link
to recover the money, but the link takes them to a malicious Web page
that tries to gather sensitive personal information. This scam is one
of more than 100 since last November. in which perpetrators have tried
to impersonate the IRS in attempts to fool victims into divulging
personal and/or financial information or into downloading malicious
code.
Fake Google Web Site Hides Trojan Horse
A fake Google Tool Bar can turn victims' machines into zombies if it is
downloaded. E-mails direct users to the Web site that perfectly mimics
the real Google download page where the victim is offered the fake tool.
Quote from: Homer on July 27, 2006, 04:20:30 PM
IRS Warns Taxpayers of E-Mail Scam Using US Treasury Payment Systems
Fake e-mail messages containing several misspellings and purporting to
be from a fictitious IRS organization are circulating. They claim that
someone has enrolled the recipient's credit card in the US Treasury's
Electronic Federal Tax Payment System and has tried to use the credit
card to pay taxes. The messages instruct recipients to click on a link
to recover the money, but the link takes them to a malicious Web page
that tries to gather sensitive personal information. This scam is one
of more than 100 since last November. in which perpetrators have tried
to impersonate the IRS in attempts to fool victims into divulging
personal and/or financial information or into downloading malicious
code.
Fake Google Web Site Hides Trojan Horse
A fake Google Tool Bar can turn victims' machines into zombies if it is
downloaded. E-mails direct users to the Web site that perfectly mimics
the real Google download page where the victim is offered the fake tool.
Thanks for the warnings
Sophos has warned of a Trojan horse that has been spammed out to e-mail
addresses disguised as a digital photograph. The Troj/Dloadr-AKX Trojan
horse has a subject line with one of the following text:
"My best photos!"
"the best pictures of us. Just take a look, i'm excited!"
"Wanna see?"
or
"You've asked for pictures. See this." The attached file is photos.zip.
Inside the ZIP file is another file called DSC00342.jpg .exe. The
executable file is a Trojan horse designed to download further malicious code from
the Internet, but disguises itself as a JPG graphic by using a double extension
and inserting multiple spaces into the filename.
1 reason I never open e-mails from strangers
I am very careful to..but I am waiting for a very very important email from a good friend.. ;:"
i just open the ones from the ppl i know
i spam every mail i dont know who its from.
Quote from: hades on August 04, 2006, 08:27:18 PM
i spam every mail i dont know who its from.
same here.
Troj/Dloadr-AMJ is a dangerous Trojan that was recently spammed out as a spoofed message asking users to open a photo in a zipped document. Once opened, the Trojan opens a backdoor that remote hackers can use to take over the computer. Once taken over, hackers can use the computer to send spam and host spyware. Remote hackers can also install key loggers and screen scrapers onto the infected PC to steal personal, confidential and financial information without the user's knowledge.
i dont open no mail i dont know who it is from
ty for the info on that homer
Quote from: Homer on September 19, 2006, 09:50:17 AM
Troj/Dloadr-AMJ is a dangerous Trojan that was recently spammed out as a spoofed message asking users to open a photo in a zipped document. Once opened, the Trojan opens a backdoor that remote hackers can use to take over the computer. Once taken over, hackers can use the computer to send spam and host spyware. Remote hackers can also install key loggers and screen scrapers onto the infected PC to steal personal, confidential and financial information without the user's knowledge.
hopefully people know by now never to open an attachment on your computer unless you know who its from!! thanks for the updates homer!! :)
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
Quote from: Tara on September 19, 2006, 12:26:55 PM
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
lol hes just being safe!! :))
Quote from: Tara on September 19, 2006, 12:26:55 PM
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
I just want everyone to recognize the importance of protection. Hee! :)))
Quote from: Homer on September 19, 2006, 01:11:40 PM
Quote from: Tara on September 19, 2006, 12:26:55 PM
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
I just want everyone to recognize the importance of protection. Hee! :)))
You need to tell Night...I don't think she has a clue. <:>
Quote from: Tara on September 19, 2006, 01:29:01 PM
Quote from: Homer on September 19, 2006, 01:11:40 PM
Quote from: Tara on September 19, 2006, 12:26:55 PM
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
I just want everyone to recognize the importance of protection. Hee! :)))
You need to tell Night...I don't think she has a clue. <:>
Who died and made me enforcement? ;:" :)))
Quote from: Homer on September 19, 2006, 01:37:03 PM
Quote from: Tara on September 19, 2006, 01:29:01 PM
Quote from: Homer on September 19, 2006, 01:11:40 PM
Quote from: Tara on September 19, 2006, 12:26:55 PM
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
I just want everyone to recognize the importance of protection. Hee! :)))
You need to tell Night...I don't think she has a clue. <:>
Who died and made me enforcement? ;:" :)))
No one around here yet, they all seem to be following your Trojan instrustions. Homers PSA's Please Save A Soul. :))
Quote from: Tara on September 19, 2006, 01:52:14 PM
Quote from: Homer on September 19, 2006, 01:37:03 PM
Quote from: Tara on September 19, 2006, 01:29:01 PM
Quote from: Homer on September 19, 2006, 01:11:40 PM
Quote from: Tara on September 19, 2006, 12:26:55 PM
Everything Homer puts in this thread has to have the word Trojan in it..He worrries me sometimes. :))
I just want everyone to recognize the importance of protection. Hee! :)))
You need to tell Night...I don't think she has a clue. <:>
Who died and made me enforcement? ;:" :)))
No one around here yet, they all seem to be following your Trojan instrustions. Homers PSA's Please Save A Soul. :))
:)) :)) :)) :)) :)) :))
Spammers pose as chain mail researchers to harvest e-mail addresses. Sophos has warned computer users to think before forwarding chain letters after discovering a new scam being used by spammers to collect e-mail addresses. A spammed e-mail campaign poses as a research project into chain mail and joke messages that are frequently sent between e-mail users around the world. Chain letters and jokes can easily be sent to a person's full contact list or an entire company department, ending up with valid e-mail addresses for everyone who received the message in the body of the message. The new spam campaign asks for chain letters to be forwarded to the spammers (who are posing as a researcher called Gemma). However, Sophos warns that rather than conducting a study of chain letters, the recipients are actually planning to gather innocent peoples' contact details for the purposes of spam and identity theft.
I delete anything that resembles a chain letter etc. get rid of alot of email that way.
I hope this is ok to post. I recd it as a security alert from Symantec..haven't seen it anywhere else yet.
Copied and pasted below.
Keep your computer safe from the New Internet Explorer zero-day attack
Protection Update
As of September 18, 2006, Symantec Security Response is advising users to take extra precautions if they use any version of Microsoft Internet Explorer as a result of a new zero-day attack against the application.The attack leverages a previously unknown vulnerability in Microsoft Internet Explorer. This vulnerability is due to the way Internet Explorer handles Vector Markup Language (VML).
Currently, the vulnerabilities are being hosted primarily on adult and ****ographic websites and used to attack users visiting those sites to install spyware onto the victim's machine. It is important to note that although the attacks appear primarily on adult sites at the moment, it is possible that they may spread to other more mainstream websites on the internet. The spyware may include a variety of security risks such as keyloggers that will monitor the keystrokes in an attempt to steal financial and confidential information.
There are no patches available from Microsoft for the vulnerability at this point.
Symantec Security Response has analyzed the threat and has provided protection for it via LiveUpdate and Intelligent Update. The current Trojan that leverages the zero-day vulnerability to attack is detected as Trojan.Vimalov. Symantec Security Response is also releasing intrusion protection (IPS) signatures to proactively protect customers against attempts to exploit the Internet Explorer vulnerability itself.
Next Steps?
If you are a current Symantec Customer running Norton AntiVirus or Norton Internet Security and regularly run LiveUpdate™, you are protected from this threat and its varients.
If you are unaware of the security status of your PC, please take one of the following actions:
What action can be taken from here?
Run LiveUpdate™
Virus Definitions are available via the LiveUpdate or the Security Response Website.
Existing Customers
If you have an older version of Norton Internet Security™ and would like to upgrade to Norton Internet Security 2007, please click here
New Customers
To protect yourself with Norton Internet Security 2007, please click here
I just read some stuff about Symantec's Zero-day protection suite.
I have one stupid question- What does the term " zero day" mean?
It sounds like the day the world will end or somethning.