Your name or email adress:
Do you already have an account?
Forgot your password?
  • Log in or Sign up

    Results 1 to 2 of 2
    1. #1
      Mamazen's Avatar
      Mamazen is offline Eco Friendly And Green!!

      Join Date
      Nov 2005
      Land of the Little Pan-African Cloth Peoples
      Blog Entries
      Thumbs Up/Down
      Received: 1/1
      Given: 0/0
      Rep Power

      Even seemingly reliable e-mail vulnerable to hackers

      0 Not allowed! Not allowed!
      Even seemingly reliable e-mail vulnerable to hackers
      By Byron Acohido,

      SEATTLE — You can no longer trust Office or QuickTime files that arrive in e-mail, even from organizations and people you deal with regularly.

      For that matter, any file from a popular software application, sent by e-mail or accessible at a website, is no longer trustworthy. Why? Data thieves are increasingly using them as snares in attacks that focus on patrons of companies and agencies that collect sensitive data, or zero in on specific individuals within certain organizations.

      Targeted attacks often escape detection. But click on the wrong thing, and "You could be opening up a door that allows the hacker to do some really bad damage," says Alan Paller, research director at The SANS Institute, a tech security think tank.

      One indicator this trend is on the rise: Microsoft last week issued security patches for a dozen critical vulnerabilities in its Office suite of programs. Since 2006, more than 260 security holes have been discovered in widely used programs from Microsoft, Adobe, Apple and RealNetworks, according to security firm Secunia. Prior to 2006, there were only a handful.

      The driver: powerful "fuzzing" tools that continuously try endless strings of computer code, searching for an open path to the computer hard drive.

      "The bad guys are trying billions of random combinations … and finding new ways to break in," says Gartner tech security analyst John Pescatore.

      Crooks use flaws uncovered by fuzzing to create tainted files disguised to fool targeted employees. Earlier this year, individuals at several corporations were targeted to receive e-mail carrying an attached Excel file corrupted via a previously unknown flaw. Clicking on the file opened a worksheet with data relevant to the targeted worker; it also gave the attacker a beachhead to probe deeper into the company's network. "The victims never really knew," says VeriSign iDefense researcher Matt Richard, who discovered the attack.

      In another attack, crooks installed a tainted QuickTime video file at several porn websites crafted to steal data from eBay and PayPal accounts, according to security firm Intego.

      "It's not just Microsoft," says Secunia Chief Technical Officer Thomas Kristensen. "Crooks now use many different ways to gain control of computers."

      Some crime groups target patrons of large organizations, hoping one corrupted computer can take them deeper into rich databases. Last year, three crime rings launched 40 such campaigns targeting, among others,, the IRS, the Federal Trade Commission and the Better Business Bureau, according to VeriSign iDefense.

      In one case, crooks using the stolen user name and password of a job recruiter logged onto and downloaded résumés for 1.3 million job candidates. Next, the thieves sent out faked e-mails enticing the job seekers to click on a free job notification tool that carried a data-stealing program.

      The crooks likely obtained the job recruiter's account log-in by culling data stolen in a different attack, says Richard.

      Computer users should accept all updates from software providers to ensure they have the latest secure version, security experts say.

      Microsoft distributes upgrades that can make all versions of Office more secure. Even so, the software giant advises treating all Web links and attachments — including Office files from familiar sources — with caution, says spokesman Bill Sisk.
      Knowing others is wisdom;
      Knowing the self is enlightenment.
      Mastering others requires force;
      Mastering the self needs strength.

      He who knows he has enough is rich.
      Perseverance is a sign of will power.
      He who stays where he is endures.
      To die but not to perish is to be eternally present.

      Lao Tsu
      Tao Te Ching

      I love animals...
      With potatoes
      And brown gravey

      Watching. Eating. Preserving. Growing. Being. The Blogletter.
      <a href=""> African Zen Woman</a>
      Yarn into cloth. Cloth into dolls. Pan-African Dolls. <a href="">Little Pan-African Cloth People</a>

    2. #2
      Jahness's Avatar
      Jahness is offline OniOni Warrior

      Join Date
      Mar 2005
      In amerikkka! Stolen from Afrika!
      Thumbs Up/Down
      Received: 1/0
      Given: 18/0
      Rep Power


      0 Not allowed! Not allowed!
      Greetings Mamazen!

      Everything and anything on the internet can be hacked one way or the next period. If you don't know who the person is that is sending it, personally then it is open target season. Hackers are very skilled. Once they make up their mind to break the code so to speak as far as finding out how something works or a way to bypass secret codes they will get it done because they are determined and it is something they love doing.

      Not because something looks legitmate doesn't measn that it is. This is the reason why online banks are getting hacked so easily. Customers fall for the logos or trademarks of these institutions and rearly doublecheck and blindly faLL FOR THE TRAP OF GIVING AWAY PRIVATE INFORMATION OF ALL TYPES THAT THEY KNOW THEY SHOULD BE MORE SECURE WITH. We have to stop being so gullible and believing all that we see and taking it at face value. In this time and age we all have to be very, very careful who we trust and how much info we give up. Emails are a very fruitful target for hackers and all types of crooks. File attachments makes it easy for the hackers to get info with no trouble from unsuspected email users of all types.

      Thanks for sharing this article mamazen.

      Posted In The Spirit of Learning & Sharing
      One Love & Respect Always

      The Quest for knowledge stops at the grave.
      HIM Emperor Haile Selassie I.

      If you fail to prepare,
      you are preparing to fail!

      Mind what you want, because someone wants your mind.

      Working together, the ants ate the elephant.

    Thread Information

    Users Browsing this Thread

    There are currently 1 users browsing this thread. (0 members and 1 guests)

    Similar Threads

    1. Liberia: Millions Vulnerable to Climate Change
      By TTDC Bot in forum Afrikan News RSS Feed
      Replies: 0
      Last Post: 07-18-2015, 01:00 AM
    2. China-Africa Relations Make The Continent Economically Vulnerable
      By TTDC Bot in forum Afrikan News RSS Feed
      Replies: 0
      Last Post: 12-04-2014, 01:00 AM
    3. South Africa: How Rape Judgement Failed Vulnerable Children
      By TTDC Bot in forum Afrikan News RSS Feed
      Replies: 0
      Last Post: 11-27-2012, 01:01 AM
    4. Millions Vulnerable to New Hack Attack
      By Jahness in forum P C Tech Advice & Technology
      Replies: 0
      Last Post: 02-20-2007, 05:31 AM
    5. US food supply 'vulnerable to attack'
      By Mamazen in forum Afrikan Wholistic Health
      Replies: 0
      Last Post: 08-22-2006, 09:13 PM

    Thread Participants: 1

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts


      Assata Shakur Speaks is an Forum Devoted To Assata Shakur And All Political Prisoners Around The World.
      Assata Shakur Speaks Is An Oasis Of Pan African Information Geared Towards The Liberation Of Afrikan People.

    Follow Us On

    Twitter Facebook youtube Flickr DavianArt Dribbble RSS Feed