Wednesday, November 17, 2010

Be Alert About The Attempts To Infect Your Computer

This was a mail circulated by the IT team. Thought it will be useful to all...

The creators of malicious software (viruses, spyware, ad-ware) are constantly trying new methods to get you to execute programs that will install malicious software on your personal and work computers. Besides the technical aspect of spreading this software, there is an even bigger social aspect to this. The creators of this software will use any method to get you to open their programs, including reaching out to your emotions. Here are some examples:

1.       Some person or group needs help and you can help by looking at the attachment.
2.       Email with blank subject line from an unknown email address.
3.       Email that seems to come from a close friend or family member. However, their computer was infected by malicious software and is sending these emails using their identity without their knowledge.
4.       Email that seems to be from a business or group you associate with and asks you to look at an attachment.
5.       Your system shows messages saying that your computer has been infected and you need to open an attachment or go to a web site to download a scanner to remove the malicious software. This only makes it worse by installing the real malicious software.  Simply click on the “x” at the top right corner to close it.
6.       And a method that is appropriate for this time of year is that a package that was sent to you failed to reach you and you need to look at the attachment for clarification. See the following article at, a well known debunker of scams on the internet:

In short, think carefully when receiving emails with attachments. You should only open attachments if you were expecting something specific from that individual. If not, ask the sender what they are sending. You may learn that the sender is just as surprised as you about the message.

Finally, read through the email message before clicking on an embedded URL or opening the attachment or zip file, etc.  Something like the following statement/disclaimer could raise a red flag: “Because email is not a secure form of communication, this email box is not equipped to handle replies.”

Here is a recent example for your review:

1 comment: