Well. I’ll say.
One of you sent me this example today. Tons of fun here.
1. After the rather alarming announcement about damaged internet security (as if we didn’t already know this),
2. Every Single Word In The First Few Paragraphs Is Capitalized. I mean every Single Word.
3. Security buzzword garbage abounds. Your TCP connection. Your Firewall. Leaked. Trojan Virus.
4. You are given a choice of visiting your Nearest Windows Service Center [sic]. Tell me, just off the top of your head, where IS your nearest Windows Service Center? Is that by any chance a booth in America’s Discount Tire?
5. Or you can of course call the Help Desk…. TOLL FREE!
Let me tell you what will happen. You will call them and they will ask to start a remote session with you on your computer so they can scan it for viruses. During that scan, they will (of course) find something wrong with your computer that they can probably help you with but there will be some charge for the service. There will most certainly be some form of this give and take. “Let us in” “Oh noze! You need to buy my service, give me your credit card, etc.”
Finally, the entire missive has an interesting and education cut and paste below the initial atrocity. This looks as though it’s been lifted from Wikipedia. Be that as it may and though it is indeed pasted in to the rest of this message, go ahead and read it for your own edification.
Warning: Internet Security Damaged !!!
A Suspicious Connection Was Trying to Access Your Logins, Banking Details & Tracking Your Internet Activity.
Your TCP Connection Was Blocked by Your Firewall. Your Accounts May be Suspended Until You Take an Action.
Your Personal Information May Have Leaked. IMMEDIATE RESPONSE REQUIRED
Your Hard Disk May Have Trojan Virus! Please Do Not Try to Fix Manually, It May Crash Your Data.
Consequently, we are performing additional security checks to verify system security.
Please Visit Your Nearest Windows Service Center OR Call Help Desk
Customer Service: + 1-844-870-4018 (TOLL-FREE)
********** IMMEDIATE RESPONSE REQUIRED **********
Please contact network administration to rectify the issue.
Please do not open internet browser for your security issue to avoid data corruption on your registery of your operating system. Please contact network administration department at + 1-844-870-4018 (TOLL-FREE)
A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Greece, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.
A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. The Trojan and backdoors are not themselves easily detectable, but if they carry out significant computing or communications activity may cause the computer to run noticeably slowly. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).
A computer may host a Trojan via a malicious program a user is duped into executing files or browsing internet.
Please contact network administration department at + 1-844-870-4018 (TOLL-FREE)