Analysis of Spam Thru botnet

Mark Sunner, Chief Security Analyst at MessageLabs was among the many security analysts watching one Trojan called “Spam Thru”, a piece of malware designed to send spam from an infected computer, at the turn of last year. Spam Thru represented an expontential jump in the level of sophistication and complexity of these botnets, harnessing a 70,000 […]

Continue Reading

Spammers now using TinyURL to flood comments

Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages. While the most widely recognized form of spam is email spam, spam in blogs is becomming huge these days along with search engine spam and mobile phone messaging spam. Spamming is economically viable because advertisers have no operating costs beyond the management […]

Continue Reading

How to restore the missing Show Desktop icon in your Toolbar

The Show Desktop Icon is not a standard program shortcut but a Windows explorer command file written in plain text.If you have accidently deleted the Show Desktop Icons, here are the steps involved to recreate it:Step 1: Open a new notepad file and type the following text: [Shell] Command=2 IconFile=explorer.exe,3 [Taskbar] Command=ToggleDesktop Step 2: Save […]

Continue Reading

What a Paypal phishing email looks like and how to detect it

In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as […]

Continue Reading