Some new warnings about various hoaxes, viruses, and Trojan horses.
These are from a reputable online newsletter and my server.
______ Attack program hijacks IE users surfing the net! ____________
A new program that takes advantage of a flaw in the Internet Explorer
browser has been found recently. The malicious program is known as
Qhosts and uses a banner ad that allows the attacker to run the
malicious code that will automatically install a Trojan horse. You can
find out more about this recent attack by checking out:
What is real and what isnít, with all the chaos in the world of
computers lately from viruses, worms, hackers, false messages, and email
fraud, who really knows? Now Microsoft is providing you with the tools
necessary to spot imposter emails before any damage can occur. From
attachment spying to digital signatures you are now capable of becoming
an email detective. Figure out how you can uncover false messages by
This message is to make sure you are aware of the new "Swen" worm that
has been spreading on the Internet. Like many worms and viruses, the
"Swen" worm is distributed through email, and your computer can become
infected if you open the attachment in the email. The email itself looks
like an email from Microsoft instructing you to install the attached
patch. But really, the email is not from Microsoft and the attachment is
the "Swen" worm. You can read more about this worm at Symantec's website
Three things to consider to protect yourself from this type of worm are:
1) Be aware that Microsoft doesn't send attachments in customer emails.
2) Always be careful about what types of attachments to open. Files
ending in .exe, .pif, .scr, and .vbs are commonly used in email worms
3) Always run a current anti-virus program on your computer. Use a
standard anti-virus program and update it regularly to help keep your
computer safe. Popular anti-virus programs include Norton and McAfee.