We’ve spoken before on the subject of the numerous call center scams that exist for the purpose of convincing people they have a problem and taking their money to “fix it”, but with the increased frequency at which we’ve been hearing about more and more clients being affected, we decided that it would be prudent to go into more detail on the types of blue screen popups and tactics users may encounter.
As we’ve mentioned, on many occasions users might run into a page that is disguised to look like an error or even a Blue Screen of Death.
This type of message can be very jarring on its own, and to make matters worse, it will often be accompanied by a computerized voice making claims about errors or viruses on your computer. However, there are some tells that clearly indicate its illegitimacy. First off, if you take a moment and look at the screen, you can tell that this screen is clearly within the internet browser, which means the computer is still running. In every case, a blue screen is a complete crash of Windows itself, which means everything else will have closed before it can be displayed. Not only this, but it prompts for readers to call a support phone number. Microsoft has no such number that they provide on the blue screen of death. Third, and sometimes most telling, is the lack of proper spelling, grammar, or capitalization on the page. These types of trap pages are oftentimes surprisingly shoddily designed, and will often mis-word or misspell even basic terms. In the case of the example above, the message not only repeats the “Please contact Microsoft technicians” twice, but it also forgets to capitalize Microsoft, while it capitalizes “Immediately” and “Rectify” for some reason. The sentence as a whole also seems somewhat clunky and indicative of “English as a second language.”
Calling the number on the page will get you to a (usually foreign) call center that will walk you through “fixing the problem” and charge you a great deal of money to do so. Refusing to comply once they have connected after a call to them can often lead to them actually messing with your computer in some way, and if the worst happens, they may make your computer unusable. To make matters worse, the page itself usually traps visitors on it with a continuously reappearing notification that prevents you from closing it, leading even people who might know better to call the number just to get control of their computer back.
Thankfully, wrenching control back from these types of pages is not impossible, and any consequences implied by the pages in question are usually empty threats. Three methods might be available to you, depending on your situation.
Method one is available to most users running a third-party internet browser; if you are running Google Chrome, Mozilla Firefox, or Opera Chromium, the option to “prevent this page from creating additional dialogues” will be available as a little checkbox at the bottom of the notification that seems to keep opening no matter how many times you close it. Checking it and acknowledging or closing the notification one more time will prevent it from appearing again, allowing you to simply close the page normally.
Method two is available to all users, but requires you forcefully close the process of your internet browser which, if you keep multiple pages open at a time, can cause you to lose whatever you are doing on the other tabs of your web browser. On your keyboard, pressing CTRL, Alt, and Delete (DEL) at the same time on a Windows PC will allow you to open the task manager. From there, simply choosing your internet browser and clicking on “End Task” will force it to close, allowing you to simply reopen it and continue working. For Mac users, pressing the key combination of Command, Option, and Escape (esc) allows you to activate the equivalent function, “Force Quit”. From that windows, simply selecting the program you wish to close and clicking Force Quit will accomplish the same result.
The “Task Manager” window in Windows 10.
The “Force Quit” screen on a Mac.
Method three should only be used as a last resort. It’s simple to execute, but it can potentially cause problems if you perform it while your computer is updating or installing something, and can at least cause you to lose data if you have any programs open and you are editing documents or files that haven’t been recently saved. In this case, simply holding down the power button on either a Mac or PC will force it to shut down, and the problem should be gone upon restarting it and logging back in.
Now in some cases, especially those in which you may have inadvertently installed something, you might be afflicted with something known as a “Browser Hijacker“, or “Scareware“. These pieces of software are some of the more extreme measures such call center scammers have been using in recent years, and they usually have the effect of automatically defaulting the home page of your internet browser to their own error page, or even going so far as to generate an otherwise inescapable error message upon computer startup. If this is the case, getting rid of such malware can be rather complicated, at which point it is usually recommended that you consult your local technician.
For many parents out there, keeping a watchful eye on the types of content their children are exposed to online is an order of high priority. To reflect the importance of this task, both Microsoft and Apple have stepped up to the plate with their own parental controls systems built right into the latest versions of Windows and Mac OS.
In the case of Microsoft, the parental control system for Windows 10 has been improved and revised somewhat from previous iterations, and is now controlled primarily through the Microsoft Accounts. Parents will set up an account for their children, and add it to their “Family”, which is a sort of administered account group. Special steps are taken to ensure the account is properly classified, allowing parents to provide the right level of protection based on the child’s age range, among other factors.
The “Child” account, once set up, is registered under the “Parent” account’s contact information for recovery purposes, just in case the account gets hacked or the password is forgotten. The parent also has the option to receive weekly activity reports regarding what the child has been up to, what sites they’ve visited, etc.
By selecting the “Manage Family Settings Online” option under the “Accounts” and “Family” settings menu, parents will be redirected to a webpage that will allow them to disallow access to inappropriate websites, as well as restricting specific undesirable, but not explicitly “Inappropriate”, websites from access. Beyond websites, the control system can also limit applications and games to specific age ranges and rating levels, or similarly, on a subject by subject basis.
In addition to Application access controls, the control panel also has the capability of limiting access to the computers during specific times, and even has functionality for restricting the total time on the computer for a given day to a specific number of hours. These types of settings are geared toward enforcing bed times and keeping kids from spending too long on the computer on school days and the like.
For Apple, setting parental controls is similarly simple, but there are a few differences. To start parental controls, the parent must obviously choose or add a child account. However, in this case, the “Managed” account does not necessarily have to be an online account, but can instead be localized to only that computer in particular.
Once the parental control system is enabled and one or more managed accounts are chosen, parents have control over many of the factors their Windows counterparts do. These include setting which applications can be used, what websites can be accessed, and the time during which that user can log in.
Beyond a blanket filter of websites the computer deems objectionable, the parent can customize what they don’t want the child to see, allowing certain websites to be blocked or allowed in particular. Alternatively, it can act with a whitelist instead, blocking every website except the websites provided on the list.
In addition to this, Mac users can also affect control over what items can be purchased in the different app stores available, as well as who the user can email or have contact with.
All in all, both systems have their merits, and with keeping children safe on the internet, parental controls have come a long way.
For many years, the vast majority of users on the internet have mostly used one or two internet browsers: Internet Explorer or Safari. Those options were always laid out as plainly as the platform they were built on, being Windows or Mac OS, respectively. However, around 2010, that started to change. With the major performance issues of the now-defunct Internet Explorer 10, and the lack of features or real change presented by Safari, more and more users began looking toward alternative web browsers.
We’ll be going over some of those options, and why you should (or shouldn’t!) make a switch, depending on your tastes.
Mainstream Web Browsers
Microsoft Internet Explorer
First off, we have the most historically widely-used internet browser, the mainstay of Windows, and probably one of the longest-running ones on this list, Internet Explorer 11. Because of its long history, it also tends to be compatible with a lot of commercial sites, which tend to be slow to change or update. This makes it a very important asset for corporations and enterprises, especially those whose size make major system changes cost or time prohibitive.
However, Internet Explorer still suffers from a bit of instability when viewing certain content, and has been known to become sluggish or unresponsive in some situations. Also, being one of the historically most popular browsers has made it a target, in the past and present, of malware and adware attacks. Older versions are probably the most vulnerable, so especially for those running 10 and prior, which are no longer supported by Microsoft, it becomes very important to upgrade or, barring that, switch to another alternative.
Next up, we have Safari. Apple’s mainstay internet browser has shown a long history, and like IE has shown considerably wide compatibility with many websites, whether they were made yesterday or fifteen years ago. Safari has also been shown to be more stable than Internet Explorer, and barring the occasional mishap, has had a very strong record of good performance and good security. With the recent integration of Siri, it has also entered the same smart browsing space as Google Chrome and Microsoft Edge. Its exclusive presence on the Mac and iOS operating systems makes obtaining and using it prohibitive to anyone not owning an Apple-branded product, but for those that do, it remains a good option.
Naturally though, there’s no such thing as a perfect product, and in a number of places Apple’s Safari web browser falls short. For example, synchronizing settings, bookmarks, and the like is not possible, except between Apple devices. Being so restricted to exactly one brand of products means cross-compatibility is non-existent, and if you find yourself using a Windows, Android, or Chrome OS device (which tend to be far more commonly available), you will have no access to the data on your Safari browser. This was somewhat excusable in the case of Internet Explorer due to its widespread availability, as well as the ability of most other browsers to import settings and favorites from it on request. Even Mac users have the capability of running Internet Explorer via Bootcamp or Virtual Machine software like Parallels, but on such a closed platform, having no presence on other systems is inconvenient.
As far as both Microsoft and Apple’s original offerings go, both offer strong compatibility, good performance, and a simple interface. However, the lack of any real customization or the lack of a centralized location to get a decent selection of addons or extensions leaves them feeling bland and somewhat limited. As mentioned before as well, being the “original” essentially paints a target on your back in regards to security breaches and annoying or less than useful toolbars and hijackers looking to hit the widest number of potential victims.
Alternative Web Browsers
Chrome has a lot of things going for it, and a lot of the changes Google has made have been pretty beneficial. First off, Chrome, especially when it first came out, was the fastest web browser around. Since its inception, it has also expanded to every platform imaginable, and can be used on Windows, Android, Mac OS, iOS, and even Linux. It also takes advantage of its cross-compatibility with its synchronizing capabilities. If you are reading an article on your Android phone, you can pick it up on your iPad or Windows PC, or any other device for that matter, right where you were. If you save a bookmark, add an extension, or save login details for a website, you will find that Chrome will have them handy on whatever device you use. Its connection to everything Google also gives it the interesting ability to allow for voice searches using “Google Now”, in which users can actually talk to the web browser to get answers on different subjects and perform searches. Chrome also has a massive library of extensions, from ad blockers to productivity tools, as well as a huge selection of themes, designs, and other tweaks to personalize it how you see fit.
Once again however, this is not to say Chrome is perfect. Unfortunately, since its now been on top in popularity for a few years, it suffers from the same targeted bloat and malicious software that the previous options have, and its extensibility has also amplified the problem to a degree, causing many Chrome users to unwittingly install such software alongside seemingly benign programs. It also seems that every piece of adware these days has some sort of hijacker or toolbar forcing victims to be annoyingly revisited by such content. Besides this, Chrome has also started picking up a bit of a flaw in its design in more recent versions. It has become very memory demanding, and although it still runs well on higher-end systems, lower-end or older hardware will suffer considerably from its hunger for more and more resources.
Whereas Google Chrome is something of a newcomer to the field of alternative web browsers, there are a couple that have persisted for much longer. One such example is Mozilla’s Firefox web browser.
Firefox is a rather interesting animal in that it stands out from the pack when it comes to a different emphasis on a few of its key features, and has historically been one of the first to develop or adopt a lot of capabilities we take for granted today. Every browser worth its bits these days has tabbed browsing, which is the ability to have multiple pages open simultaneously within the same web browser. Although so many use this feature in the present day, Firefox was the first, and it still has the most refined tab experience. It allows users to efficiently group multiple tabs into organized groups relating to certain subjects, almost akin to how one might organize a set of paper documents in a file folder. Another development is the smart location bar, which allows users to find webpages and information they frequently access or have recently visited simply by typing a related term or even a few letters into the address bar. Besides it features, however, Firefox has probably the greatest emphasis in the group on privacy and security, and tends to be the least vulnerable to phishing attacks looking to steal user information, and even goes so far as to actively block sites that it detects are dangerous or misleading. Firefox seems to focus a lot in areas different from the other browsers here, and to further fill that idea, it has shown to be the most lightweight web browser around – using about half the average memory of Chrome and significantly less than any of the aforementioned options.
Where Firefox excels in some ways over other options, it also has some weaknesses in comparison. Partially as a caveat to its low memory usage, Firefox has one of the slowest startup times on this list, and does not reload recently closed pages or tabs nearly as quickly as some others. In addition to this, with how its (admittedly plentiful) addons work, running multiple instances of Firefox or mutliple addons can cause a significant slowdown or instability. Finally, it is still somewhat less compatible with some websites than other options, and it can be almost overprotective in some cases, occasionally blocking perfectly legitimate websites or services it believes are harmful in some way.
Over the years, Opera has accumulated quite a troupe of interesting capabilities, most of which have remained to the present day. First and foremost, there’s Opera Turbo: a function that compresses website data before sending it, decompressing it on arrival. This provides the benefit of loading pages more quickly on a slow internet connection, as well as saving data on a metered or limited internet connection, for example on airline flights or with mobile hotspots and smartphone networks. Furthering the idea of getting to the pages you want quickly, Opera also has a feature called “Speed Dial”, which, in the same vein as a telephone, is a fully customizable menu which Opera opens to by default that can store links to frequently used or important websites.
There are also a variety of other handy features built right into the web browser, many of which often exist as dedicated programs elsewhere. For example, it has a built in Email client which can handle multiple accounts, an RSS reader, a note manager similar to Evernote, and even a Torrent downloading client. Other minor features involve the ability to preview tabs by hovering over them, reload webpages automatically on a set schedule (for those bloggers and bidders out there), and control common browser functions (Back, Forward, Refresh, New Tab, Etc.) with mouse gestures. It’s also built on Chromium just like Google Chrome, but it lacks a lot of the vulnerability to bloat with a tighter sense of security and, partially thanks to its uncommonness, much less of a focus by malicious software writers. It also manages to be one of the lightest on memory usage, trailing only behind Firefox on its lack of resource demand.
Opera is an interesting project in that it rectifies a lot of the flaws in some of the other browsers on this list, but it doesn’t particularly excel at any one thing. It’s features are numerous and different, and it comes with a lot of capabilities pre-packaged, but also because of its uncommonness, it doesn’t have a strong following in the extension development community. On the performance side, it doesn’t really stand out from the others either. It’s not the fastest, nor the lightest-weight, nor the most secure, nor the most extensible, nor even the most widely compatible browser on this list. It gets good scores on average where a lot of the others will flop in at least one area, but it never tops the charts. As they say: jack of all trades, master of none.
But wait! You didn’t mention this browser under the mainstream browsers section. It’s a Microsoft product, and it’s meant to replace Internet Explorer! Doesn’t that automatically make it a mainstream browser?
Well… Not quite. Microsoft Edge may be the “powerful new web browser” built from the ground up to serve as the heir apparent to Internet Explorer, but it’s not quite mainstream yet. For one thing, Edge was in experimental stages as early as six months ago. All things considered, it’s very young. Secondly, it is not backwards compatible with versions of Windows before Windows 10. That’s right, it’s a Windows 10 exclusive. However, that doesn’t mean it should be discounted. In fact, if you’ve bought a computer in the last few months, you more than likely have Edge already, and if your current computer is from within the last six years, you probably have the chance to get Windows 10 for free. But this isn’t news, as everyone has seen the upgrade option at some point or another.
Regarding Edge though, it definitely lives up to the hype regarding its performance over Internet Explorer. Pages load faster, its more secure, it launches more quickly, and it is designed more intelligently. From my article regarding changes in Windows 10, “It has a very clean aesthetic, and most of the menus and settings are laid out in a very straight forward manner. In terms of integration, it works quite well with Cortana, allowing her to learn about the user’s needs over time, as well as allowing her to assist you and carry out functions within the browser.” It also has the unique feature of allowing users to capture entire web pages, even space outside the boundary of the screen (which alone functions better than any screenshot software I’ve ever seen), and write on them or edit them for collaborative projects or presentations. It also appears to be far less vulnerable to intrusion or exploitation than most browsers currently, and it has solid security.
It uses a good deal of memory, but it actually relinquishes it when closing tabs much better than Google Chrome seems to want to, and that’s alright with it being part of only the latest iteration of Windows. It doesn’t have support for extensions at the present time, but it’s planning on having them in the future. It’s still somewhat buggy, though, and that’s its greatest weakness: its age. Tabs don’t always close, some websites don’t display completely, and occasionally it lags for a second or so when loading new webpages. However, it’s solid otherwise and should improve on its deficiencies in time. Remember when I said that Microsoft Edge is Internet Explorer’s “heir apparent”? It hasn’t deposed Internet Explorer or anything. IE is still present, even in Windows 10, for “compatibility purposes”. This simply means that Microsoft acknowledges that Edge is not yet fully matured, and some things might not yet work with it. For those things that don’t, users have something to fall back on.
Who knew something as cute as a dancing squirrel could be so dangerous? Apparently not the 9 year old, that clicked on the impossibly cute link giving that new laptop something not so cute – laptop virus and the need for a malware removal service. Web browsing has become a fundamental activity in the average daily life of most of the U.S. population. It is so common many get a false sense of security and will read any email and click any link that appears recommended by a friend – making the environment an attractive target for the not so cute, distributers of malware. As of June of 2010, 77.3% of the U.S. population uses the internet, according to the United Nations technology agency ITU. Cheaper computers and expanded access to connections have driven growth in internet usage for the last decade.
Viruses, trojans and other dangerous malware are constantly attacking this large, diverse and growing set of users. Malware, an abbreviation of malicious software, exists for one reason, to do something bad. It may be an “annoying” bad or a “scary stolen identity and make life a nightmare” bad or somewhere in the middle. No matter what the intent, malware is in all cases bad; it is the number one risk to personal security online.
The first experience many have with malware is when it infects their computer by exploiting a browser weakness, browser plug-in or opening a hidden file and using a security hole in an application used to view the file, like Adobe Reader. Even users that think they visit only safe sites can be infected. Malware has been distributed to unsuspecting users on large popular sites, like Google, hidden in banner ads.
More Secure Browsers
In an effort to provide more protections to users, Mozilla Firefox 4, Google Chrome 10 and Internet Explorer 9 (IE9) updated security and privacy features. News and blog articles have already appeared announcing which browser has the best security in all the land. Which is the best? As with most things, it depends. Users will have to decide which features are most important based on how they use the internet and what information they wish to share. No matter which browser emerges as a personal favorite, the increased competition to improve protections is a win for all users.
Key new features include:
IE9, Chrome and Firefox added options for users to request that sites stop tracking what they do at other locations on the web as part of the do not track initiative. It’s kind of a do not call list for the internet. Users should be aware, however, that at this time, sites do not have to honor the settings
The security sandbox, which isolates browser plug-ins from the rest of the computer, has been expanded to include the integrated Flash player so that malware embedded in Flash content can’t damage the computer.
Updated malware reporting. The browser also auto-blocks sites known to be performing unsafe activities like phishing or other malware attacks. Users can configure an add-on like the Web of Trust extension or a separate security program to block threats or Google’s embedded list.
Automatically disables old versions of plugins to prevent hacking
The account syncing feature, which syncs themes, preferences, auto-fill entries, extensions, and bookmarks with a Gmail account, has been updated with encryption and password protection.
Internet Explorer 9
Allows Active X filtering so that Active X only executes on trusted sites.
The download manager has been integrated with malware protection. Some studies are reporting that the browser blocks about 99% of malware.
Added a HSTS feature that can turn any site into a secured site (HTTPS). Now, even if the web being visited doesn’t encrypt content, the browser can.
Blocks malicious scripts from running
Modified the settings for visited links so that people walking by can’t easily see what links a users has visited
Have you started using one of the new browser versions? Do you feel they are more secure? Are there any features you feel should have been included? Let us know.
Google has announced an enhancement to its already popular Google applications suite a cloud-based laptop developed in conjunction with manufacturers Samsung and Acer named what else – Chromebook. According to Google,
“You won’t have to wait minutes for your computer to boot and browser to start. You’ll be reading email in seconds.”
8 seconds actually, according to the product’s website. Who emails anymore? That’s a topic for another post.
The new offering from Google uses the company’s Chrome browser and Chromium operating system. Goggle, says the device can last an entire day on a single charge. An impressive feat and definitely one the that those tethered at an undesirable location with an electrical umbilical cord promising to complete one more blog post will welcome.
The device features:
Automatic software updates
Optional 3G with 100G data transfer
Built in security
Cloud based storage
Chromebooks are expected to be available in the US, UK, France, Netherlands, Italy and Spain on June 15, and additional countries will follow. Google released Chromebook initially for students at $20.00 per month at last week’s Google I/O conference. Now the company has announced Chromebooks for Business and Education for $28 per user per month for businesses.
What Do You Mean Cloud Computing Isn’t Magic
Despite shouts of Windows killer and the end of the desktop. It won’t happen. It’s hype. A storm or a dead spot and the laptop is rendered unusable – although Google promises it will fix the issue soon. Aren’t these basically slightly fancier versions of 80’s style dumb terminals. Plus, Google’s cloud-based operating system is not the first cloud based version – at least 10 viable options exist and they have not managed to “change the game.” That spot currently belongs to the venerable all-star Apple iPad, which introduced a sexy form factor, and a unique browsing experience that has enticed millions of users to drop a grand on something nobody really needs.
However, at $20 a month, the Chromebook is not a significant investment and will likely entice many to at least try it out. Before renting the device, users may want to ask a few questions like:
Who will do customer service? Will customers be caught between retailers selling the device and Google to get answers?
How frequently can hardware be exchanged?
Who will fix the laptop should something go wrong?
What happens if your kid breaks the device?
We are not trying to be overly critical of the device. It might be awesome. Interested in taking a Chromebook for a test drive? The devices will be available at Amazon and Best Buy domestically starting next month. If you decide to invest, be sure to come back and let us know what you think of your new toy.
We are certain that we’ve never heard anyone utter the phrase,
“You know I really enjoy seeing that little hour-glass when I browse the Internet.”
Users frequently visit multiple pages simultaneously spread across numerous windows or tabs to satisfy their fleeting web attention spans. Everyone has personal preferences for their browsing experience, but the desire to see more content more quickly seems almost universal. There are lots of reasons users could experience slow downs while browsing the web
Poorly designed sites
Limited bandwidth internet connections
Computer memory or performance constraints
With all of these possibilities, is there really anything the average user can do to improve the speed at which they experience the web? You can bet your bandwidth there are options. Read our tips below if you want to enjoy epically fast web browsing.
Use tabs instead of windows, but don’t get crazy. Almost all major browser versions support tabs. Using tabs provides a quicker web experience than pages because tabs allow users to locate and switch between content easily, while windows can become hidden or obstructed. Multiple tabs in one window is just easier. In addition, tabs in most browsers use fewer computing resources than opening a completely new browser window.
Tabs are a good thing, but, too much of a good thing can cause problems too. Opening too many tabs at once will slow down the browser. Excessive numbers of open tabs also adds clutter that can make it difficult to locate content.
Only install and activate a reasonable number of extensions. Browser extensions can provide valuable functionality that is not available out of the box in a browser. Helpful tools to support activities like blogging or looking up references. However, like with tabs, if browser extensions are not used in moderation, they can affect browser stability and performance.
Users should pick a few extensions that improve productivity most or that they use frequently, and remove all others to truly optimize the speed of web browsing.
Get a decent browser. Despite rants by technologists and campaigns by Microsoft to kill Internet Explorer, some users insist on continuing use of Internet Explorer 6. Just stop. Simply switching to a newer, faster browser will result in a dramatically improved browsing experience. This is even more true given the many performance improvements in recently released Internet Explorer 9, Google Chrome 10 and Firefox 4. The renewed interest and competition in performance has resulted in a new generation of much faster and lighter weight browsers that can benefit almost all users.
Quit downloading toolbars. The number of toolbars available for browsers has been growing like water logged Gremlins after midnight. Like excessive use of tabs and plug-ins, too many toolbars slow down browser performance and consume screen real estate. Toolbars can also make browsing slower by constantly sending and receiving data, reducing the amount of bandwidth available for legitimate uses. If users don’t absolutely require a toolbar, it should be removed immediately.
Learn keyboard shortcuts. This recommendation may not seem straight forward, but learning keyboard shortcuts can make it much faster to execute common actions like opening windows or switching between pages can go much faster when using a key stroke or two. Every browser has different shortcuts, but they are are easy to learn and make web browsing peppy.
Many other performance improvements and specialized tools could increase the speed of your browsing experience. However, these five quick and low-cost techniques are accessible by even the most non-technical user and provide an immediate impact. Try them out before purchasing the latest offering to “Speed Up Your Computer!” being advertised on that late night infomercial and let us know what you think.
Apparently, there can be worse things in the mail than bills. This month multiple big-name shipping vendors have had their brands exploited and used in malware distribution schemes. We have written before about the security dangers of malware, and how even seemingly “safe” web destinations can harbor significant risks. This month our words of wisdom have again been validated, but we won’t say “I told you so,” at least, not again. Email is being used in all of the malware campaigns where DHL, USPS and FedEx branding is being to trick users into downloading and executing malicious files. The large number of Internet users that aren’t especially technically savvy will continue to make low-tech attacks attractive to criminals.
In the FedEx malware attack, recipients receive a letter that appears to announce the impending delivery of a package. However, the only thing that the email is actually signaling delivery of is the need for a computer virus removal service. The message with the subject “FedEx notification #random number” and the message:
includes attachments that when executed, attempt to download additional files and steal FTP credentials stored on the infected device.
Criminals in the DHL attack, also executed in March, used a similar technique to distribute their trojan, but apparently did not run spell-check before sending out their malware-laden spam.
In the United States Postal Service malware attack, the spam message appears to be a failed package delivery notification for express mail, with the subject “Post Express Information. Your package is available for pick up.” The message claims that an error in the shipping address caused the package to be returned to the post office, from where it can be retrieved. If users click on the attachment, they will definitely want to return the trojan and scareware that is installed.
Delivery notifications and similar techniques have been used previously in computer attacks. Users have to be aware that caution should be exercised with every link, even those that appear legitimate. How can you protect yourself? Install anti-virus and malware protection and make sure it automatically updates. Any content downloaded should be scanned with a virus scanner and malware protection should be kept current on all systems that access the Internet, including mobile devices.