peanuticus said...
Now I'm curious. I've been working in IT and security for a while and I'm really not sure how you guys are getting hit by keyloggers etc.
echostorm said...
5. When they then plead with you that they paid too much just play dumb, say that it was the correct amount and that the goods were sent, following this click block on there address details or if you were really tricky log out of your 'new' email account
6. Go buy a new kite with the money you have made from that nigerian leech and feel happy in the fact that you scammed the scammer.
@echostormThats all well and good, but it's not the nigerian's money - it could be your account or snoidberg's account that has had the money transferred out of it. In any event the bank will come calling pretty shortly after with their hand out. Oh, and that small detail that knowledge = criminal intent.
@peanuticusIf only it was as simple as a firewall and windows updates.
I agree with not using IE - more than half of the malware out there is targetting IE only, however much of it springboards off javascript, and I'll bet all my kites that 99% of the people here roam around with JS switched on all the time - because a very high proportion of websites out there require it to work properly.
Now what happens is that the bad guys will do a MASSIVE distributed attack infecting ALOT of websites, or sometimes they may just hack a few high-traffic sites. The past couple of weeks, in a single attack, there was over
half a million sites hacked and a redirector to a website in china which executes malicious code on your computer via javascript (similar to an iFrame hack). So that website you visit today, it could be an online shop you like, your antivirus vendor, favourite restaurant or uni -will infect your ass. Those are actual examples, too.
Even if it's only a 5% infection rate (an often quoted figure), multiply that by the number of visitors to half a million websites and you suddenly have a heap of infected people who, depending on the infection they get, may install a keylogger, make them an open proxy (someone got a six figure bill from Telstra for excess usage when they got their box owned), a spam relay, or participe in any number of other activities. Or, all of the above.
As I said before this is big business out there now and they adjust their malware every couple of days (some more than once a day) so that the antivirus vendors can't keep up.
You think Bill Gates and Norton will protect you? Think again.
Run away! Run away! The sky is falling! The sky is falling!

Sk