Re: 3/18/2013 2:54:34 AM
You will notice that this particular exploit is morphing. Originally there
toggle quoted message
Show quoted text
wasn't any subject and later the sender's name was used as the subject and now a time/date is used as a subject. I conclude that this is being done to avoid the usual simple, brute-force methods of blocking the emails of this particular exploit. In the past Yahoo hasn't been very good at reacting quickly to morphing exploits. And half of the blame goes to the various vulnerable web browsers and probably some blame goes to Java as well. I do know that Yahoo has believed that they have stopped this particular exploit twice already, according to their own news reports. Hopefully Yahoo figures out a better/smarter way to stop it's propagation soon. Christopher Erickson Consulting Engineer Summit Kinetics Waikoloa, HI 96738 www.summitkinetics.com -----Original Message-----
From: ap-gto@... [mailto:ap-gto@...] On Behalf Of Joe Zeglinski Sent: Sunday, March 17, 2013 6:47 PM To: ap-gto@... Subject: Re: [ap-gto] 3/18/2013 2:54:34 AM Hi Chris, That was an obvious virus. I just don't understand why Yahoo hasn't caught onto this scam, after probably a year. I would have thought that one of their filters would look for the obvious - a message, with no text, often no subject, just a link. Such emails should either be immediately trashed, or isolated for the moderators to handle, rather than letting such garbage through, into the group. I hope everyone here is discriminating enough to recognize this trap. I mean, if you saw a grenade lying on the sidewalk would you pull its pin, just to see if it still works ;-) Joe ------------------------------------ To UNSUBSCRIBE, or for general information on the ap-gto list see http://groups.yahoo.com/group/ap-gtoYahoo! Groups Links ----- No virus found in this message. Checked by AVG - www.avg.com Version: 2013.0.2904 / Virus Database: 2641/6168 - Release Date: 03/12/13 |
|