123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Earlier First Lady Becomes An Aim Of Malware Sting

Profile Picture
By Author: Isaiah Henry
Total Articles: 220
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Surrounded by computer experts and a detail of Secret Service Men, even the presidential candidate was not immune to a malware scam. Millions of the former First Lady�s supporters and constituents received an email entitled �Hillary Clinton Full Video!!� The email did not contain a video of Mrs. Clinton; it had absolutely nothing to do with her in fact. Instead, the email contained an intrusive, annoying and sometimes dangerous malware scam.

Beginning in February, 2008, a widely-distributed email found its way around the globe. The particular email that put millions of computers at risk was entitled �Hillary Clinton Full Video�. In recent history, there has never been a campaign or election that garnered the attention this year�s presidential race has. Due in large part to the heightened interest in this race, many people opened the email hoping to learn more about the presidential candidate. There were destined to be disappointed when they opened the email and received malicious malware instead.

If you are not familiar with the term �malware�, don�t ...
... feel bad, you have plenty of company. Many frequent computer users incorrectly describe it as �a computer virus�. Even the media is confused and uses the terms interchangeably. That is incorrect because not all malware come in the form of viruses.

Let�s trace the steps of the Hillary Clinton �Video� email to see how malware scams can be spread. Finding the email in their inboxes, most people eagerly opened it without suspicion of any kind. They had no reason to be suspicious; after all, they believed it came from Hillary Clinton and appeared to be a valid email. That�s the problem; malware operates covertly and intrudes upon computers without the owner�s knowledge or consent.

Once opened, the email contained a link to a page set up to look like a Google search page. It was not affiliated with Google in any way; instead, it was the way malware was able to install itself onto the operating systems. Once in place, the malware scam is free to install spyware, adware, viruses, worms and rootkits. Some viruses are so dangerous they can cause moderate to severe damage to your computer.

How can you protect your computer from a potentially dangerous malware scam? There may be no way currently that you can absolutely protect your operating system, 100% of the time. However, there are things you can do to minimize your risks. Even though internet security software (like the popular Norton Internet Security and Spyware Doctor) doesn�t catch all malware; often, they block most of it.

Even Norton and other sophisticated internet security systems cannot guarantee absolute protection. The closest you can come to fool-proof protection is to open emails only from people/addresses with which you are completely familiar and comfortable.

Total Views: 308Word Count: 475See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: