<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Fake Update for Microsoft Outlook/Outlook Express (KB910721)</title>
	<atom:link href="http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-update-microsoft-outlook-outlook-express-kb910721</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/comment-page-1/#comment-149</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 12 Aug 2009 09:14:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=310#comment-149</guid>
		<description><![CDATA[Hi Kevin,

Thanks a lot for sharing your cautionary tale with us. You&#039;re right of course; even when you know what to look out for it&#039;s possible to fall victim at times through no fault of your own especially when attacks make use of software vulnerabilities to trigger without any user interaction at all. And unfortunately criminals found numerous ways how to steal in the digital age. In fact I wrote a series about this very subject - if you want to check it out, or anyone else for that matter, it&#039;s called 21st Century Heists and can be accessed in these 3 installments:

http://www.gfi.com/blog/21st-century-heists-part-1/
http://www.gfi.com/blog/21st-century-heists-part-2/
http://www.gfi.com/blog/21st-century-heists-part-3/

Also on the subject is an article on how to protect your business from social engineering attacks:
http://www.gfi.com/blog/security-human-element/

Thanks again for your post]]></description>
		<content:encoded><![CDATA[<p>Hi Kevin,</p>
<p>Thanks a lot for sharing your cautionary tale with us. You&#8217;re right of course; even when you know what to look out for it&#8217;s possible to fall victim at times through no fault of your own especially when attacks make use of software vulnerabilities to trigger without any user interaction at all. And unfortunately criminals found numerous ways how to steal in the digital age. In fact I wrote a series about this very subject &#8211; if you want to check it out, or anyone else for that matter, it&#8217;s called 21st Century Heists and can be accessed in these 3 installments:</p>
<p><a href="http://www.gfi.com/blog/21st-century-heists-part-1/" rel="nofollow">http://www.gfi.com/blog/21st-century-heists-part-1/</a><br />
<a href="http://www.gfi.com/blog/21st-century-heists-part-2/" rel="nofollow">http://www.gfi.com/blog/21st-century-heists-part-2/</a><br />
<a href="http://www.gfi.com/blog/21st-century-heists-part-3/" rel="nofollow">http://www.gfi.com/blog/21st-century-heists-part-3/</a></p>
<p>Also on the subject is an article on how to protect your business from social engineering attacks:<br />
<a href="http://www.gfi.com/blog/security-human-element/" rel="nofollow">http://www.gfi.com/blog/security-human-element/</a></p>
<p>Thanks again for your post</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kevin Regan</title>
		<link>http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/comment-page-1/#comment-137</link>
		<dc:creator>Kevin Regan</dc:creator>
		<pubDate>Thu, 06 Aug 2009 10:07:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=310#comment-137</guid>
		<description><![CDATA[Excellent post - luckily I goggled the information on the e-mail I received and found your excellent analysis.
I am always caution about attachments and downloads of any kind as well as phishing attacks. I downloaded a trojan once and all my key stokes were picked up by an attacker in the midlands area of the UK, it was during the last world cup and I was almost caught, &quot;Off guard&quot;. He managed to take several thousand pounds out of my online bank account, but, I was able to get the bank involved in time and the money was re credited to my account. The online banking systems are fortunately more robust these days and cannot be breached by knowledge of passwords only...
I am a private investigator by the way and despite a good knowledge of the net and its threats I can still get caught out!
Be careful out there!

regards,

Kevin Regan.]]></description>
		<content:encoded><![CDATA[<p>Excellent post &#8211; luckily I goggled the information on the e-mail I received and found your excellent analysis.<br />
I am always caution about attachments and downloads of any kind as well as phishing attacks. I downloaded a trojan once and all my key stokes were picked up by an attacker in the midlands area of the UK, it was during the last world cup and I was almost caught, &#8220;Off guard&#8221;. He managed to take several thousand pounds out of my online bank account, but, I was able to get the bank involved in time and the money was re credited to my account. The online banking systems are fortunately more robust these days and cannot be breached by knowledge of passwords only&#8230;<br />
I am a private investigator by the way and despite a good knowledge of the net and its threats I can still get caught out!<br />
Be careful out there!</p>
<p>regards,</p>
<p>Kevin Regan.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/comment-page-1/#comment-11</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 01 Jul 2009 09:59:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=310#comment-11</guid>
		<description><![CDATA[Hi Tina,

First step is to verify if you were infected and, if that’s the case, with what malware. Best way to achieve this is to virus scan your machine (ensure you have the latest virus definition files) and if you still have the file you downloaded, try submitting it to virustotal (http://www.virustotal.com/) or a similar service to verify what kind of malware (if any) it is that you might have installed. 

If you do not have an antivirus solution but the issue is on your private home system consider using a free anti-virus solution such as AVG (http://free.avg.com/); if it&#039;s not for private use maybe you can use an online anti-virus scan such as that offered by Kaspersky (http://www.kaspersky.com/virusscanner) - it will not clean the infection but at least it should detect it and tell you what it is. Once you know what infection, if any, you are dealing with, you can then decide your next steps. If an infection is confirmed try to limit your machine interaction with your network to prevent the virus from spreading as much as possible. 

If you need further help do not hesitate to post more information about what infection we&#039;re dealing with and we can go on from there. Hope this helps and good luck!]]></description>
		<content:encoded><![CDATA[<p>Hi Tina,</p>
<p>First step is to verify if you were infected and, if that’s the case, with what malware. Best way to achieve this is to virus scan your machine (ensure you have the latest virus definition files) and if you still have the file you downloaded, try submitting it to virustotal (<a href="http://www.virustotal.com/" rel="nofollow">http://www.virustotal.com/</a>) or a similar service to verify what kind of malware (if any) it is that you might have installed. </p>
<p>If you do not have an antivirus solution but the issue is on your private home system consider using a free anti-virus solution such as AVG (<a href="http://free.avg.com/" rel="nofollow">http://free.avg.com/</a>); if it&#8217;s not for private use maybe you can use an online anti-virus scan such as that offered by Kaspersky (<a href="http://www.kaspersky.com/virusscanner" rel="nofollow">http://www.kaspersky.com/virusscanner</a>) &#8211; it will not clean the infection but at least it should detect it and tell you what it is. Once you know what infection, if any, you are dealing with, you can then decide your next steps. If an infection is confirmed try to limit your machine interaction with your network to prevent the virus from spreading as much as possible. </p>
<p>If you need further help do not hesitate to post more information about what infection we&#8217;re dealing with and we can go on from there. Hope this helps and good luck!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: TIna Ho</title>
		<link>http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/comment-page-1/#comment-10</link>
		<dc:creator>TIna Ho</dc:creator>
		<pubDate>Tue, 30 Jun 2009 17:07:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=310#comment-10</guid>
		<description><![CDATA[Hi,

If I clicked on it previously, what can I do about it now? to solve or rectify the issue?

Thanks!]]></description>
		<content:encoded><![CDATA[<p>Hi,</p>
<p>If I clicked on it previously, what can I do about it now? to solve or rectify the issue?</p>
<p>Thanks!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jack</title>
		<link>http://www.gfi.com/blog/fake-update-microsoft-outlook-outlook-express-kb910721/comment-page-1/#comment-9</link>
		<dc:creator>Jack</dc:creator>
		<pubDate>Fri, 26 Jun 2009 10:48:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=310#comment-9</guid>
		<description><![CDATA[nice catch ...social engineering keeps showing it&#039;s head .....very easy to misintepret this for a valid email...95% of users wouldn&#039;t have a clue....
...takes me back to the great old days of I Love You, nimda, klez....

ahh...nostalgia]]></description>
		<content:encoded><![CDATA[<p>nice catch &#8230;social engineering keeps showing it&#8217;s head &#8230;..very easy to misintepret this for a valid email&#8230;95% of users wouldn&#8217;t have a clue&#8230;.<br />
&#8230;takes me back to the great old days of I Love You, nimda, klez&#8230;.</p>
<p>ahh&#8230;nostalgia</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:36:30 by W3 Total Cache --