The procedure that the user had to follow was so convoluted as to be ridiculous – print out the document, fill in the form and then fax it to the indicated telephone number.Another unusual case happened in Japan in the autumn of 2005 when cybercriminals used a home-delivery service to distribute CDs infected with Trojan spyware.These methods are often used simultaneously and usually include processes to circumvent antivirus programs as much as possible.Social engineering techniques lure an unwary user into launching an infected file or opening a link to an infected site by underhand means.If you know of any good Websites or Databases that are not shown below, then please email us & we will try to include them.Also let us know if any of the links are dead & we will update them.
For example, a user is offered the possibility of gaining free Internet/cellular access, or the chance to download a credit card number generator, or to increase their own online account balance, etc.Links to infected sites and files hidden inside emails have become very popular of late, with potential victims receiving messages sent via email, ICQ and other IM systems, or occasionally via IRC Internet chatrooms. A message usually contains an attractive text which encourages the unsuspecting user to click on the link.This method of system penetration is the most popular and effective because it allows the malware to bypass the mail server’s antivirus filters. A worm or a Trojan appears on the P2P network using a name designed to attract attention, for example: When searching for programs, P2P users see these names, download the files and launch them.The Nimda and Aliz mail worms exploited Outlook’s vulnerabilities.In order to launch the worm file it was enough to open an infected message, or simply put the cursor on it in the preview window.
An unknown Russian fraudster tried something unusual back in 2005-2006.