Computer users have long been warned to be particularly cautious of any email that has come into their email box unsolicited. Computer users have always been encouraged to use firewall and anti-virus programs to protect themselves from being viciously attacked by spam. Spam has been a nuisance since it was first employed by use of sales agents looking for quick commissions. Since that, time spam has turned in to a web surfer’s nightmare. A good deal of spam is vulgar and insensitive asking users to open email and click links. These links hold a headache of trying to straighten out an infected computer as well as personal and business issues that are affected by a spammer’s ploy. There have been infected emails that carry images that secretly begin eating away at the now contaminated computer.
The most recent of email spam involves the ploy of luring unsuspecting users to view an internet post card, or greeting card. The spamming email seems sufficiently innocent; someone cares and wants to share a smile. However, when following the web link that is provided, the user is taken to a web based Trojan, downloadable executable file. Once the file has downloaded to the user’s computer, the hacker is able to gain access to the computer and its internal intelligence easily. Currently the fabrication of web pages and emails are being used for attacking computers. It seems that new variations of Sober worms are beginning to show back up in the computer world. These new Sober worms are sent through spam emails. For now, these infected emails carry a message that a company has received a query from the user. The query usually involves encouraging the computer user to click on a password attachment file in the email. The tainted worm attachment is usually called: Passw_Data, PDatan, or Mail_Data.
Thus far, the attachments have been in zip file form. Once the Sober worm malware downloads into a computer, the infected computer then begins to download any additional malicious code in meets while online. Adware is also liable in many infected computers. Adware goes to work by tracking a computer user’s comings and goings while online. When a computer has been infected by Adware, the hacker is able to view where the user has been while online. Adware can reveal the words used in research and the web pages that the computer has tracked through while online. Once the hacker has this information, they create custom-made advertisement for instance hot links or pop-up and pop-under windows to web pages that are not connected to a page’s code. Adware can also change your home page and your search engine, sending you to unfamiliar sites.
Hackers are paid for leading computer users onto advertisement sites. If a new toolbar shows up on your computer, that you did not download yourself, it is a sign of being hacked by Adware software. Trojans are responsible also for ruthless computer attacks. Trojan programs are the cross dresser in the spam family, as they claim they are one thing, yet they are something entirely different. Trojans can masquerade as an entertaining game; however, their true color shines through as they erase the hard disc from your computer. What can we do in defense of spam traffic? Use your firewall and anti-virus programs; do not open emails that are unexpected even if the say they are addressed from your best friend. Stay current in your computer’s updates. Be sure to scan everything!