[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Author Index][Search Archives]

Fwd: Norton AntiVirus Special Symantec SupportNow! Bulletin



 

---- Begin included message ----
January 08, 1999


NOTE:
This is an outgoing e-mail address. Please do not reply
to this e-mail message. If you need help installing,
configuring, or troubleshooting a Symantec product,
please visit the following address and click Ask a Tech:

    http://www.symantec.com/techsupp/

_____________________________

To see an HTML version of this newsletter, please visit the
following Internet web site (URL):

 http://www.symantec.com/techsupp/bulletin/archive/nav/0199nav.html

_____________________________

In this new issue:

1.0 New AOL Trojan - PICTURE.EXE
1.1 A Note About Trojan Horses
2.0 UNSUBSCRIBING



1.0 New AOL Trojan - PICTURE.EXE
This is a special Symantec SupportNow! Bulletin that provides
information about a new AOL Trojan - PICTURE.EXE

There is a new password stealing Trojan circulating on America
Online (AOL).  If you receive an unsolicited email with a
file called PICTURE.EXE attached, DO NOT open or run PICTURE.EXE.

If this Trojan is executed, it sends encrypted information about
your AOL account to an email address and usually tries to
make your computer dial out to connect.

We have added detection of this Trojan in our latest definitions,
so make sure your definitions are up to date.  Run LiveUpdate
or download the latest definitions from:

http://www.symantec.com/avcenter/download.html


1.1 A Note About Trojan Horses
Approximately 90 percent of Trojan Horses found in circulation
today are from online services. Significant numbers of Trojan
Horses are designed to steal a user's login ID and password
and then e-mail it to someone else who can use the account
at the owner's expense.

Other Trojan Horses may display obscene messages on the user's
screen or delete the contents of their hard drive.

A Trojan Horse, unlike a virus, does not replicate.  Users
typically get Trojan Horses by downloading a program that
seems safe or promises the user something like free online
time. Once it is downloaded and executed, the malicious code
begins to work.

The difference between Trojan Horses and traditional computer
viruses is that Trojan Horses do not replicate or spread
on their own. They can only be transmitted intentionally
via email or diskette or downloaded directly onto a PC.

This means that, unlike a traditional computer virus, users
are typically only affected once by a specific Trojan Horse.




Thank you for purchasing and using Norton AntiVirus!



2.0 UNSUBSCRIBING

If you no longer wish to receive these newsletters, please let
us know:

1. Create a new email addressed to:

        listserv@lserver.symantec.com.

2. In the Subject line of your email software, type:

        unsubscribe

3. Type the following:

        signoff winfax-techinfo-l

   in the body of the message.
4. Send the message.

If you would like to unsubscribe from other Symantec newsletters,
please visit the following web site and follow the appropriate
instructions:

    http://www.symantec.com/techsupp/bulletin/index.html


Copyright 1998 Symantec Corporation. All rights reserved.
Materials cannot be published in other documents without the
express, written permission of Symantec Corp.
---- End included message ----