The junk mail touts Windows Vista Ultimate for sale at a $319 discount, says Sophos.
Messages shilling cut-rate copies of Windows Vista are using the latest image tactics to slip through spam filters, the Sophos security company warned Tuesday.
The junk mail touts Windows Vista Ultimate for sale at a $319 discount, said Sophos, which also noted that the campaign relies on several current spammer techniques to trick defenses, including random background pixilation, hiding the bulk of the message in an image, and requiring the user to manually type in the URL rather than embed an easily-found link.
"This carries all the hallmarks of a typical image spam," said Graham Cluley, a Sophos senior technology consultant, in a statement. "Approximately 30% of all spam is now using images to try and sneak past anti-spam filters. Computer users need to ensure that they have strong defenses in place or they will continue to be bombarded by nuisances like this."
Sophos wasn't sure whether the deal was semi-legitimate—that a copy of Windows would actually be shipped to the user—or if the spammer was actually a phisher harvesting credit-card numbers. If the former, the copy would almost certainly be counterfeit, since Microsoft has yet to release Vista to anyone but volume license customers.
In fact, Microsoft last week warned users of that very thing as it updated Vista to block pirates who had cobbled together a bogus operating system from Vista previews and the final code. "Users can be confident that 100% of the copies of Windows Vista advertised for purchase or download prior to the Jan. 30, 2007 consumer general availability date are counterfeit," Microsoft said in a statement on Dec. 14.
"The growth of image spam is one of the security stories of the year. Internet users should make it their New Year's resolution to make 2007 the time they get wise to Internet threats," Sophos' Cluley continued. "The average man in the street hasn't got a clue."
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.