LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
ENN Year in Review 2004: Virus Wars Print E-mail
User Rating:      How can I rate this item?
Source: electricnews.net - Posted by Vincenzo Ciaglia   
Hacks/Cracks Malware used to be easy to detect and avoid. Virus writers would attach a malicious programme to an e-mail and distribute it as widely as possible. If any of the recipients opened the attachment, the virus could delete system and data files, search for confidential information and propagate itself on the local network. In those simple days, viruses were like vampires -- as long as you didn't invite them in, they couldn't do you any harm. If you refrained from opening e-mail attachments from strangers, then you were safe.


It's not that there has been any decrease in Nosferatu-type attacks in 2004. In fact, the number of e-mail borne viruses has continued to increase. According to MessageLabs, which keeps monthly statistics on the subject, one in sixteen e-mails carries a virus. The figures for Ireland are even more depressing, with one in 12 e-mails arriving in the average inbox carrying malware.

But as the malware industry develops, the creators of viruses have found new ways to encourage users to participate in their own destruction. In particular, the incidence of the identity theft scam known as "phishing" has exploded over the past twelve months.

With this scam, fraudsters send e-mails to users, purporting to be from their bank or e-mail provider. The user is requested to visit a website at which they will be asked to provide confidential bank account or credit card information, which is then misappropriated by the fraudsters.

In September 2003, MessageLabs intercepted only 279 phishing e-mails. In November of 2004, the company intercepted more than two million and has intercepted more than 18 million over the course of the year. The company has also noted a new form of phishing e-mail, which is designed to capture online banking details when a user opens a mail, rather than when the user clicks on the URL links within the message.

Read this full article at electricnews.net

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Apache Warns of Tomcat Remote Code Execution Vulnerability
Cloud security: We're asking the wrong questions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.