Recent research conducted by security researchers at the University of Reading in the UK has revealed a new phishing attack targeting Microsoft Outlook users. The latest attack, codenamed “Evasive Computer Code”. Can be traced back to Microsoft’s email servers and has affected more than 3000 email servers in the UK. Researchers say that apart from infecting the main server. The latest variant of the attack also changes email passwords, changes email hostnames, and redirects users to phishing websites.
Many Problems With Microsoft Email Server Configuration
Microsoft has released official antivirus updates to combat the latest phishing attempts. However, users also need to check for updates on their respective email servers. Microsoft’s official support website has published a blog showing the status of Security Essentials, XP Service Pack 2, and Windows Vista Service Pack 2.It is now noted that even though Security Essentials has been updated, many people still have problems due to their already configured email server. worn. Users need to verify their email server security settings to ensure that their email is safe and protected.
Many people have changed their email service providers to avoid the newest threats. However, when they change providers, they may not know that their email server has been hacked. When they tried to check, they found that there was no trace of the attack. This makes it very difficult for them to contact their respective email service providers and request updates. The UK’s Information Commissioner has stated that investigations into the matter have so far not been able to find any evidence to suggest that any acts were deliberately committed by the hackers.
Most Common Methods for Hackers
The most common method attackers use to infiltrate email servers is to trick users into clicking on a link in a spam message. Once the user opens this message. Their computer will be infected with a malicious program that could install a key logger on their system. With this software, hackers will be able to monitor all visited sites and all activities carried out on the computer. From here, hackers can then gain access to personal information as well as bank accounts. Other common methods include sending phishing emails that appear to be from a reputable company. Users must ensure that the email they receive does not come from a genuine company and that they only click on the link contained on the legitimate website.
Also Read Articles About Designing Your Own Electric Airplane