There’s always a good time to remind us all to be vigilant against the threat of a computer virus getting onto your machine, and worse still, if it starts to do its evil work.
I’m sure you are vigilant, but please remind all that you know to watch out for the latest trends in attacks on your computer.
Some of the latest trends the crooks are using include:-
- Sending an invoice so that it looks as if it’s coming from a company you know. Needless to say, the attachment is not an invoice, it’s a Trojan.
- E-mails supposedly with pictures of you, or celebrities, describing you or them caught in compromising or seductive poses. Again, the attachment is evil. Do not even look at the attachment.
- Messages from DHL or delivery companies suggesting they tried to deliver a parcel. It’s fake. Again, the delivery note attached to the e-mail contains a Trojan.
- Messages from a bank, or any business, asking you to log on to reactivate your account. The link the crooks send is not to the bank, but it really looks legitimate. As soon as you log on the crooks have your bank of registration details. With every one they trick into completing the form, the crooks are laughing all the way to the bank!
- What’s App, or Skype voicemail messages. You guessed it, they are not legitimate e-mails. The attachment will compromise your computer.
- You may also get emails titled, Hey, and Hello, which simply consist of a link. These links are poisoned and will deliver a nasty payload to your machine.
The crooks are getting so sophisticated and spend a great deal of time making the e-mail look legitimate that it really looks as if it’s a genuine e-mail. Another trick is for the crooks to let the trojan sit on your computer until it is accidentally activated. Why would it get accidentally activated? It is saved with a name that looks enticing, such as “holiday” or the name of a celebrity.
These messages are sent using e-mail spoofing, and few are actually from the real sender, such as DHL or your bank.
I’m sure you have antivirus and antispyware programs installed, but those programs are only reactive to the threats when they scan, and when a threat is discovered in the wild. Your best plan of action is vigilance, and to delete the message as soon as possible, especially before you back up your computer. If you run a backup before deleting, the backup programme just makes a copy of the message and stores it for another time.
We’ve compiled a useful toolkit of anti-spam and anti-spyware tools, along with some tools to help sort e-mail before it gets onto your computer. If you’d lik to know more, just let us know.
Don’t get caught out, and I hope you find this is a useful reminder.