OT-Fw: About Antivirus Software: Netsky.L, Sober.D worms discovered


Antivirus Softwareneed to update.
Roger , Colfax  WA
----- Original Message -----
From: Mary Landesman - About.com Antivirus Software Guide
To: res@COLFAX.COM
Sent: Wednesday, March 10, 2004 12:10 PM
Subject: About Antivirus Software: Netsky.L, Sober.D worms discovered



       Antivirus Software
       In the Spotlight | More Topics | Top Picks | Windows Basics

         from Mary Landesman, your Editor and Guide
      Just when it seemed last week's worm wars had finally abated, a new
variant of Netsky appears - but this time, there's no 'good' worm act
involved. Plus, a new variant of the Sober family was discovered on March 8th
and quickly became a medium level threat. Not just worms plague the Internet.
Folks still report multiple browser hijackings. If your startpage is
defaulting to porn and ad-laden sites, chances are your security settings are
leaving you at risk.


      In the Spotlight


      Netsky.L discovered. But is it an imposter?
      Discovered on March 10, 2004, Netsky.L might ordinarily be considered
just another variant in the Netsky family. But an abrupt change of behaviour
has some security experts wondering whether Netsky.L is actually an imposter.
                 More Topics
            . Netsky.D description
            Mass mailer shuts down other worms
            . Bagle bombing
            Bagle worms attack Netsky author
            . Sober.C description
            Mass mailing, filesharing worm
            . Sober.B description
            Bilingual worm spreads via email, P2P
            . Browser hijacking
            Protect yourself from parasites
            . JDBGMGR.EXE Hoax
            Old hoax continues to be believed
            . Hoax Encyclopedia
            Check the facts before you forward

      Sober.D worm discovered
      A new variant of the Sober worm was discovered spreading in the early
morning hours (GMT) on March 8, 2004. Dubbed Sober.D by most vendors and
Roca.A by antivirus vendor Sophos, the worm follows in the footsteps of
Sober.A, Sober.B, and Sober.C, sending itself in either German or English
depending on the domain suffix of the intended victim.

      War of the worms
      A battle is waging between three groups of virus writers, each
attempting to prove superiority over the other. While these virus writers
create worms that hurl accusations at one another, the real victims of this
battle remain the users caught...read more

      Top Picks - Books on hacker techniques from your Internet/Network
Security Guide

      These books are all part of a genre of books that show, in detail, the
methods, tools, tricks and techniques used by hackers and crackers to find and
exploit the holes in your network. Rather than simply teaching people "how to
hack" these books go one step further and tell you how to protect yourself and
defend your network from these attacks.

      1) Hacking Exposed - 4th Edition
      Things change quickly in the security world and the authors of Hacking
Exposed-4th Edition have done a tremendous job at taking a great thing and
making it better by updating it with new attacks and countermeasures. Knowing
the tools and techniques used to gather information on and infiltrate your
network, accompanied by countermeasures that work to thwart those attacks, is
invaluable information.

      2) Hacker's Challenge 2
      Hacker's Challenge 2 is a sort of practical exam for the Hacking Exposed
series. The style of the challenges is fairly entertaining and the plots are
so engaging you may not want to put the book down. Its like a best-selling
mystery novel for network security techies. This is a great book to help you
test your system security skills.

      3) Hack Attacks Revealed
      John Chirillo has made a career of hacking (for the good guys). In Hack
Attacks Revealed, he shares his knowledge of how hackers gain the information
necessary to break into your systems. Mr. Chirillo covers the the protocols
used and the purpose of the various ports used. The book also provides
information on the scanning and network discovery tools used by hackers.


      Featured Offer






      Windows basics

      Free email class
      A two-part course designed to provide you with a basic knowledge of
Windows, the first lesson starts with a closer look at files, extensions, and
their associated programs. The second and final lesson will provide an
overview of the Windows System Registry, truly the central nervous system for
Windows and the programs that run under it.

      Visit Related About GuideSites:
      Business Software Email Focus on PC Support
      Internet/Network Security Urban Legends and Folklore

          Search About

      More Newsletters: To sign up for more free newsletters on What You Need
to Know About your favorite topics, visit: http://talk.about.com

      You are receiving this newsletter because you subscribed to the About
Antivirus Software newsletter as res@COLFAX.COM. If you no longer wish to
receive emails from us, please visit:
      http://about.com/nl/usgs.htm?nl=antivirus&e=res@COLFAX.COM

      About respects your privacy. Our Privacy Policy.

      Our Contact Information.
      249 West 17th Street
      New York, NY, 10011

      ) 2004 About, Inc.

---------------------------------------------------------------------
Pumpkin-growing archives: http://www.hort.net/lists/pumpkins/
To sign-off this list, send email to majordomo@hort.net with the
message text UNSUBSCRIBE PUMPKINS



Other Mailing lists | Author Index | Date Index | Subject Index | Thread Index