Unwelcome greeting

Tarnowski, Joseph
September 2007
Progressive Grocer;9/1/2007, Vol. 86 Issue 11, p66
Trade Publication
The article offers information on malicious electronic greeting cards. These type of e-mail attack disguises malicious code behind a seemingly harmless greeting. They normally have a subject line Movie-quality e-card and provide an e-mail address of the sender to trick the recipient into clicking on the harmful link. Clicking on the Web site address link in the e-mail triggers an installation of one or two files on the user's machine, thus facilitating phishing.


Related Articles

  • Cybercrooks Go Phishing on Social Networks. Chua, Melissa // PCWorld;Apr2009, Vol. 27 Issue 4, p44 

    The article discusses a MessageLabs Intelligence report on security issues and threats, which cites a popular tactic in 2008 among cybercriminals involving the use of fictitious accounts on social networking sites to post malicious links, which usually led to phishing sites. Scammers would then...

  • 2004: The Security Year Reviewed.  // Database & Network Journal;Dec2004, Vol. 34 Issue 6, p20 

    This article reports that Graham Cluley, senior technology consultant at Sophos, has reviewed the virus and spam landscape for 2004 and has taken a hype-free look at the potential threats for 2005.

  • British Teen Sentenced for Computer Worm Reports Sophos.  // Software World;Jan2005, Vol. 36 Issue 1, p24 

    Reports that a British teenager has been convicted for releasing the Randex computer worm, designed to turn innocent infected computers into compromised zombies for mass-mailing spam campaigns.

  • THE STATS.  // SC Magazine: For IT Security Professionals (15476693);Mar2011, Vol. 22 Issue 3, p13 

    The article presents statistics on the percentage of spam in English and the percentage of spam sent from botnets.

  • Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. Huber, Markus; Mulazzani, Martin; Weippl, Edgar; Kitzler, Gerhard; Goluch, Sigrun // IEEE Internet Computing;05/01/2011, Vol. 15 Issue 3, p28 

    Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the feasibility of such an attack and simulate the...

  • Beat back spam in growing e-mail world. Yudkowsky, Chaim // Business Journal (Central New York);11/1/2002, Vol. 16 Issue 44, p19 

    Discusses the problems associated with spam. Production of workplace-harassment issues; Supply of computer viruses to the corporate network; Details of the spam operation.

  • Warezov Botnet Raises Its Head Again.  // Bank Security Report;Nov2010, Vol. 39 Issue 11, p6 

    The article reports on the return of Warezov botnet on its spamming activities starting on October 7, 2011 by using compromised Hotmail accounts to send out massive quantities of spam using the web-based email service.

  • Why does your e-mail address get spam?  // Network World;3/24/2003, Vol. 20 Issue 12, p6 

    Discusses the results of the experiment from the Center for Democracy and Technology, about unsolicited electronic mail messages. Sources of spam.

  • Taking the Bait. Wolfe, Daniel // American Banker;10/5/2011, Vol. 176 Issue 154, p7 

    The article reports on phishing attacks and malware sent in spam emails that impersonate the Nacha electronic payments association, according to information from the website krebsonsecurity.com.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics