A supposed sex record showcasing Larissa Riquelme a Paraguayan model continue to flow online while hiding a unhelpful PC Trojan or virus which infects systems that download the video. Todanoticia.com reports this throughout the 3rd week of July 2010.The malicious e-mail, in an effort to come into view believable as well as cheat the receiver, uses and speak to purport to be from news @ @ comercio.com.pe. At the same time, it attempt at sending an e-mail from El Comercio’s (Peruvian newspaper) online account.
States the e-mail, a sure security camera wedged model Larissa Riquelme of Paraguay, who is also referred to as “Bride of the World,” in an close position with a soccer player from Peru at a Miraflores hotel, causing much surprise to many. The e-mail, reportedly, provides an attachment containing a video file. EWorldpost.com reported this during the 3rd week of July 2010.
Also, there’s also a web-link named elcomercio.pe in the e-mail that the reader is hypothetical to click.
Security researchers corroborate that the e-mail is a spam and the more popular ‘celebrity spam’ type. During the recent years, the method has used several celebrity names like Paris Hilton and Britney Spears with an objective to get users to follow hateful web-links.
Troublingly, the researchers report of a rising overlap between malware writers and spammers, with a nasty cycle of spam being utilized for disseminating malicious software that in turn disseminate additional spam.
As a consequence of the maliciousness intrinsic in these kinds of harmful spam runs, safety specialists advocate Internet users that they must adopt certain simple events that will keep their systems safe from getting hijacked with such spam mails. First, they must delete all spam mails without even viewing them. Second, they mustn’t follow web-links implanted on e-mails of these kinds since the web-links can have malware able of compromise their systems.
Also, users must install the most recent anti-spyware and anti-virus programs along with a excellence firewall that will keep their PCs guarded. And if there is any doubt that a user’s PC has been impure alternatively hijacked then he must get his PC examined without the least delay.