New worm spreads via Yahoo instant messenger

Learn more in today\'s cybersecurity update.

Cybersecurity Update – Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on “>The Daily Debrief with Chris Dorobek and Amy Morris (3-7 p.m.). CNet reports. The worm arrives via a message from a contact with the word “photo” or “photos” and a smiley face icon, along with a link to a Web site resembling a Facebook page, MySpace page, or some other page where photos might reside. According to Symantec, the anti-virus company, the executable file on on Windows systems will download and if the user runs the file, the computer will become infected and the malicious message will be distributed to all of the IM contacts.

  • The Justice Department’s battle against counterfiet computer equipment has scored a victory — 30 victories, in fact. The Departments of Justice and the Homeland Security have announced that they won 30 felony convictions and seized $143 million worth of counterfeit network computer equipment manufactured in China. It came out of an initiative called Operation Network Raider. The announcement came as a Saudi citizen living in Sugarland, Texas, was sentenced to 51 months in prison. He was ordered to pay $119,400 in restitution to Cisco Systems Inc., whose network hardware is a prime target of counterfeiters. Ehab Ashoor, 49, bought counterfeit Cisco equipment from an online vendor in China intending to sell it to the U.S. Marine Corps in Iraq for transmitting troop movements, relaying intelligence and maintaining security for a military base west of Fallujah, according to evidence at the trial.
  • Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

      Stacy Bostjanick and Jennifer Henderson

      Risk and Compliance Exchange 2024: DoD’ Stacy Bostjanick, DCMA’s Jennifer Henderson on finding ‘any means possible’ to help small biz with CMMC

      Read more
      Amelia Brust/Federal News Networkcybersecurity

      How should software producers be held accountable for shoddy cybersecurity products?

      Read more