Feeds

The Valentine's Day virus massacre

Cupid's poison arrow

  • alert
  • submit to reddit

Top three mobile application threats

Exchanging electronic Valentine's cards and downloading romance-themed programs from the Internet increases the risk of spreading viruses.

So says Sophos which we applaud for its initiative in unearthing the antivirus angle in February 14.

The AV vendor cautions users to be vigilant because disguising worms as greetings card has become a popular ploy for virus writers.

The recently discovered San VBS worm attempts to tempt users into visiting a Web site harbouring malicious code using a Valentine's Day message, written in Spanish. Another worm, Zacker-C, attempted to pass off a malicious attachment as a New Year greeting card.

There are several other examples, including the infamous Love Bug (aka ILOVEYOU) and Melissa-B viruses, which show that the warning is not misplaced.

According to Graham Cluley, senior technology consultant at Sophos Anti-Virus, administrators should consider blocking files with double extensions, executable or VBS attachment at the corporate gateway. Users can play their part by practising 'safe computing' (for example not opening suspect attachments and being wary of visiting suspicious Web sites), he adds.

Email lovers can check out Valentine's United, a new anonymous email service which features a 'reply' option.

A spokeswoman for 192.com, the firm behind the service, said it was taking security seriously, for example by allowing recipients to block further messages from undesirable suitors. Valentine's United omits the facility to embed attachments in messages or add hyperlinks. There's numerous ways of sending anonymous emails through sites that don't have these security constraints in place, so we don't think Vx crews will be flocking to the site.

But is the service a poor excuse for real romantic gestures? Not so, says Valentine's United.

"The service is a fun way of building up rapport and getting to know someone. You can follow up with those lovely chocolates or flowers later," the company gushes. ®

Related Stories

Have you forgotten it's Valentines Day?
Getting sexual with Virgin textual
Users haven't learned any lessons from the Love Bug
Rise in viruses within emails outpacing growth of email
It's My Party and I'll infect you if I want to
BadTrans-B tops virus charts

3 Big data security analytics techniques

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.