New Virus threat


log in

Advanced search

Message boards : Science (non-SETI) : New Virus threat

Author Message
Profile Chris SProject donor
Volunteer tester
Avatar
Send message
Joined: 19 Nov 00
Posts: 32151
Credit: 13,936,660
RAC: 24,661
United Kingdom
Message 1190929 - Posted: 2 Feb 2012, 12:31:25 UTC

It has always been good policy not to open an email from somebody you don't know, as it confirms a working email account and may encourage further spam. Now it seems there is another reason.


Virus threat

Profile ignorance is no excuse
Avatar
Send message
Joined: 4 Oct 00
Posts: 9529
Credit: 44,433,321
RAC: 0
Korea, North
Message 1190944 - Posted: 2 Feb 2012, 13:52:17 UTC - in response to Message 1190929.

why did my computer say loading after I clicked on the link ; )
____________
In a rich man's house there is no place to spit but his face.
Diogenes Of Sinope

End terrorism by building a school

Profile Gary CharpentierProject donor
Volunteer tester
Avatar
Send message
Joined: 25 Dec 00
Posts: 12814
Credit: 7,395,569
RAC: 18,346
United States
Message 1190959 - Posted: 2 Feb 2012, 14:45:31 UTC

Just tell your computer to ignore HTML and you will be fine. Hasn't this been around forever? Wasn't the first wave jpg files that automatically load when you read the e-mail? So now it is java scripts in HTML. BFD. Insist on ASCII.


____________

Profile tullioProject donor
Send message
Joined: 9 Apr 04
Posts: 3772
Credit: 388,811
RAC: 108
Italy
Message 1190988 - Posted: 2 Feb 2012, 16:32:34 UTC

I am using NoScript, an add-on on Firefox.
Tullio
____________

Profile Cheng Fan Soon
Send message
Joined: 3 Oct 05
Posts: 67
Credit: 667,647
RAC: 1
Malaysia
Message 1191518 - Posted: 4 Feb 2012, 19:34:01 UTC

Am i right of saying this:

"When my pc infected with malicious software (sent by the hacker),
and the hacker take over my pc (or my pc got hijacked by the hacker).
It is like the hacker sitting infront of my pc.
He can do what ever he like...download/upload any files/pictures he like.

But the person who face the consequences is me because it is my pc and the internet account is under my name. The hacker is totally hidden, i don't know who the hacker is, and the ISP also unable to trace who the hacker is?

Profile SciManStevProject donor
Volunteer tester
Avatar
Send message
Joined: 20 Jun 99
Posts: 4880
Credit: 83,321,135
RAC: 37,982
United States
Message 1191526 - Posted: 4 Feb 2012, 19:44:28 UTC - in response to Message 1191518.

Am i right of saying this:

"When my pc infected with malicious software (sent by the hacker),
and the hacker take over my pc (or my pc got hijacked by the hacker).
It is like the hacker sitting infront of my pc.
He can do what ever he like...download/upload any files/pictures he like.

But the person who face the consequences is me because it is my pc and the internet account is under my name. The hacker is totally hidden, i don't know who the hacker is, and the ISP also unable to trace who the hacker is?


Yes, you are right. Many times a computer can be turned into a zombie, directed to attack anything from government installations, to power companies, all without the knowledge of the computers owner. It is usually easy to determine the attack didn't come from your computer, but it requires the police, or other law enforcement organizations coming into your home and confiscating your computer to find out what's going on. Your computer will be returned to you, but not before it has been gone through thoroughly for a second time. The virus writer has most likely already gone through it once you were infected the first time, so your system and privacy can be violated two or even more times through no fault of your own.

Steve
____________
Warning, addicted to SETI crunching!
Crunching as a member of GPU Users Group.
GPUUG Website

Message boards : Science (non-SETI) : New Virus threat

Copyright © 2014 University of California