Tampilkan postingan dengan label Security. Tampilkan semua postingan
Tampilkan postingan dengan label Security. Tampilkan semua postingan

Selasa, 10 Mei 2011

Osama Bin Laden Photo Trojan Spread over Internet

After the rampant scam videos of Osama Bin Laden's death spread on up, now turn that Osama Photos with a file that is named Fotos_Osama_Bin_Laden.zip spread through email attachments. If you get an email that contains file attachments Fotos_Osama_Bin_Laden.zip or the like by the name of the file NEVER OPENED.

In accordance with that reported by F-Secure Labs, the email has spread a lot on the internet with Fotos_Osama_Bin_Laden.zip name, file attachments can also be Photos_Osama_Bin_Laden.zip which contains the installation files with the extension. EXE (Fotos_Osama_Bin_Laden.exe).

The file extension. exe is not an installer file that contains the photo of Osama Bin Laden's death, but it stands for only a dangerous Trojan-named Trojan-Downloader: w32/Banload.BKHJ, known as the Banking Trojan. If the trojan is installed on a computer system so all online banking activity will be recorded and recorded via the Browse Helper Object (BHO) and internet banking transactions online payment you will be directed to the wrong account to the account owner or trojan.

If any of you who have been downloading or clicking on an attachment that contains the trojan is advised to directly update and run antivirus or anti-malware after you disable access to the internet first.

After the death of Osama Bin Laden's computer system security attackers exploit this moment to create a new trojan-trojan.

Hackers attack Microsoft's Get 7000 times per second

If you're a hacker, and you plan to create a malware or virus, your final destination is sure to send it to Microsoft - not true?

Have not you had your computer system crashes on Windows-based Operarion System? when the OS crashes and error is usually in Windows will be out a message that encourages us to send the error log on Windows Operating System that we use.

Basically, the log message is also part of the genius hacker. Typologinya the hackerlah who deliberately make crash the OS that we use, then insert malicious code in the log message would we send to Microsoft later, further tersebutlah code assigned to attack directly to the server Microsot.

Senior Microsoft security architect Rocky Heckman has expressed.

"People - people usually send us their virus code when they try to create a virus, they would deliberately make a crash on their own system, and this is very unusual, because how many attacks we faced."

According to Heckman, based on the number of attacks on the Microsoft.com site, per day to reach 7000 up to 9000 times per second. It was amazing! Furthermore, if you want to try to attack Microsoft?,, hehehehe

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More