Computers can be controlled by hackers because of YM errors
Buffer overflows in two ActiveX Web components of the online messaging tool can provide an opportunity for hackers to install viruses, Trojans to steal information or install backdoors to control a victim's computer.
To exploit the vulnerability, the attacker creates a website or e-mail and then tricks the victim into viewing it. If they click on the link or open the email, the exploit code is executed and the computer will be controlled.
BKIS Network Security Center assessed that this is the most remarkable cyber security event in the past month because it could affect the Internet community in Vietnam. Yahoo Messenger currently has about 16 million chatter in the country used.
BKIS recommends that if you are unsure if your computer has been patched, users should install the latest version of Yahoo! Messenger available at: messenger.yahoo.com/download.php.
In the past 30 days, Malware (a common way for malware types including: viruses, trojans, spyware, adware) with "herd" infection is a big danger.
" When infected with this type of malware, if not cured in time, the victim's computer will quickly be infected with a series of other malware from the Internet, " said Virus Manager of BKIS Vu Ngoc Son. " When users access a website that contains malicious code, the Malware 'landing' starts to take place. First, they lower the security level of the system, disable firewall programs. This preparation step will enable them to continue pulling other malware from the Internet without any problems. "
According to statistics, there were 351,000 domestic computers infected with this type of malware and each of them could pull about 15 to 20 other malware.
No. Virus name Infection rate1W32.WinibA.Worm6.60%2W32.Winib.Worm6.25%3W32.CatchYMK.Worm2.41%4W32.CatchYMQ.Worm1.84%5W32. SCkeylogA.Trojan1.61%6W32.DakNongB.Worm1.54%7W32.RavMonA.Worm1.47%8W32.SalityS.PE1.41%9W32.NotifyB.Worm1.36%10W32. CatchYMN.Worm1.35%
" If you see unusual signs like: strange web pages automatically pop up, the browser home page is changed to another site . then the computer may be infected. Please contact the application. expert to receive timely assistance , "Mr. Son recommended.
Nguyen Hang
You should read it
- 9 things to do when detecting a computer infected with malware
- Signs that your computer is infected with malware
- How to Remove Malware from a Mac
- What is Safe Malware? Why is it so dangerous?
- The list of nearly 600 MAC addresses was targeted in the recent hacking of millions of ASUS computer users
- Microsoft: 100% of PCs in Vietnam are infected with malware
- How to identify computers infected with viruses with 10 characteristic signs
- 5 signs of computer infection with malware
May be interested
- How to fix errors cannot be found or missing .DLL filesdll errors are especially troublesome because there are many types of files like this that exist, all of which pose the potential for errors. fortunately, there are several troubleshooting steps you can take to fix any dll errors.
- More than 1 million computers are infected by hackershackers design fake websites to scare internet users to download and install fake antivirus software.
- How to fix common errors on MEmu . emulatormenu is a lightweight android emulator that is suitable for many low-powered computers to help users play android games on their computers. however, during use, many users have encountered errors that memu launch failed, crashes, 100% load errors,... . these are common errors on the memu emulator and to fix these errors, readers can refer to the instructions in the article below and follow the steps.
- How to fix common errors on Windows computersduring the process of using the computer, do you often have errors? this article shares with you 10 common errors on computers using windows and instructions on how to fix them
- The way Hacker uses to remain anonymoushackers use different ways to remain anonymous while hacking, but it must be said that anonymity is completely unthinkable, but hackers can be safe and anonymous to some degree and ensure backwardness. it is very difficult.
- World hackers in Chinathe wall street journal has revealed some of the chinese hackers' underground world - the focus of hackers in the world today ...
- Hide malicious code in Windows logs file to attack computers, new ways of attack by hackershackers are constantly inventing new ways to attack corporate and user computer systems.
- How to Use Controlled Folder Access on Windows 11 to Protect Your Datacontrolled folder access with high security features on windows 11. here is how to use controlled folder access on windows 11 to protect your data.
- It's time to change the definition of hackersmost dictionaries define 'hackers' with evil connotations. but now it's time to change this.
- Access and control remote Windows computers via Mac OS X systemcomputers using windows xp professional, and some versions of windows vista or 7 (except home, basic and starter) can be remotely controlled via the remote desktop connection feature. this process allows others to log in and use windows-based computers as if sitting directly next to them ...