Personal Tech Pipeline | Cyber Crime | E-Greetings Pose Security Risk

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

July 19, 2005

E-Greetings Pose Security Risk



Courtesy of TechWeb News

Cyber criminals are increasingly using e-greetings to lure consumers into clicking on links that download malicious code into their computers, a security expert said Tuesday.

Over the last three months, Internet security vendor SurfControl Plc has tracked a 30 percent jump in malicious e-mail threats, with more than half attempting to entice recipients to click on a link that takes them to a fictitious e-greeting card.

"This rise in malicious e-greeting attacks is being driven by a multi-billion dollar black market for stolen information," Susan Larson, vice president of global threat analysis for SurfControl, said in a statement.

In addition, there has been a sharp rise in the number of e-mails disguised as legitimate communications from a company's IT department or other legitimate business group, the Scotts Valley, Calif.-based, company said.

The number of malicious code-based e-mail threats is expected to double over the next quarter, according to SurfControl.

The malicious e-greeting messages, which are often difficult to detect at a casual glance, direct the recipient to click on a link that takes them to a normal-looking e-greeting card. Behind the HTML, however, is Java script that gathers vital computer settings, such as operating system, browser, virtual machine and anti-virus settings, and then downloads a Trojan best suited for infecting the machine.

The attackers hope to turn the computer in zombies for sending illegal spam messages, or to install key-loggers in order to try to steal passwords used in online banking or other websites, SurControl said.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
Unleash the Power & Opportunity of Grid Computing
Experts will identify trends in grid computing, provide
examples and examine solution options.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Transform your IT infrastructure with IBM
Successful CIOs see IT as a prime stimulus for business innovation-and themselves as key participants in a process that develops business and IT strategies in concert. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

EMC SAN helps El Camino deliver superior service
EMC CLARiiON and Centera systems are helping El Camino Hospital provide better patient care. The hospital can quickly and effortlessly monitor, modify, and protect the availability of its entire storage environment while saving money ($150,000)

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
Stellent eSeminar "Approaches to Metadata Design" on March 23
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia