


A number of open source and modified Trojans, altered to
avoid anti-virus detection, have been used. Or, the e-mails are sent to specific or targeted recipients. Unlike ”phishing” attacks, the e-mails use subject lines often referring to work or other subjects that the recipient would find relevant. The e-mails containing the dangerous attachments, or links to web sites hosting Trojan files are spoofed, making it appear to come from a colleague or reliable party. When opened, the file or link installs the Trojan which can be configured to transmit information to a remote attacker using ports assigned to a common service.


Other than the prevention stated in My E-Commerce blog,you must make sure that your computers are up-to-date with security software updates; make sure you have installed, and are using the latest version of anti-virus software; keep your operating system and Microsoft Office software up-to-date; be suspicious of email m
essages and other electronic communications from sources you do not know or recognize; or do not ever open email attachment from unknown sources. I strongly recommend Kaspersky as it manages to give a strong and reliable protection.Click here for more detailed prevention.

Useful links:
1) Hackers using YouTube to spread latest Trojan threat, dubbed Fake Codec
2) Window Live OneCare
3) Threat of Exposure
No comments:
Post a Comment