What you need to know:
Another major news story sparks the release of viruses. Hackers
Are taken advantage of the highly publicized death of Michael
Jackson and duping unsuspecting users into installing malware on
What you need to Do:
* Be Skeptical of links and sites that play on the hot news topics
* Do not open emails that contain attachments that you were not expecting.
* Do not click on links in emails that promise information
or pictures of Michael Jackson.
* Be sure to keep your Invisus software up and to date and run
ONE OF THE VIRUSES IS DISTRIBUTED THROUGH A FILE NAMED
Michae-wwww.google.com.exe. This file has been distributed
throught photos - google.com and possibly also through photo-msn.org,
facebook-photo.net and orkutimages.com. Don't visit these sites.
If you run Michael-www.google.com.exe. it drops files named
reptile.exe and winudp.exe, which are backdoor IRC bots, and
which display a fake error message dialog box: "Picture
cannot be displayed." Once a backdoor is installed, you
are open to many more attacks and risk of losing personal
INTERNET EXPLORER FLAW GIVES HACKERS
CONTROL OF YOUR COMPUTER
WHAT YOU NEED TO KNOW:
Microsoft corp. has released a warning about a serious
computer security vulnerability it hasn't fixed yet.
This new hole disclosed Monday affects Internet
explorer users whos computers run the windows xp or windows
server 2003 operating software.
The exploit used by hackers can allow them to remotely take control
of victims' machines. What makes this treat even more serious
is that the victims don't need to do anything to get
infected except visit web site that's been hacked. there
are no prompts to download anything or open anything up.
WHAT YOU NEED TO DO:
* What you need to do:
*Try not to visit any sites you are unfamiliar with until this is
patched by microsoft.
* Remember to always keep your INVISUS software updated
and run scans regularly. Your software will detect tools
the hacker may use to control your computer.
* Don't click on links or visit websites that are sent to you in
emails . they may be taking you to a hacked website.
The vulnerability affects a part of Internet Explorer that is
used to play video. The Problem arises from the way the video
software interacts with internet explorer, which opens a hole for
hackers to tunnel into.
Thousands of sites have been hacked to serve up malicoius
software that exploits the vulnerability. People are drawn
to these sites by clicking a link in spam e-mail.