Wednesday, 16th April 2025
Recent Articles
  • Automate Repetitive tasks using Mouse/Macro Recorders

    Through out a day, almost all computer user do many repetitive tasks on computer and internet. If you are one of them, then Macro recorders can help you to reduce the stress of repetitive tasks from your hands and wrist

  • How To Get Full Version of WinRAR For Free

    Free winrar, Full version Winrar, Winrar Serial key  I guess everyone know what is Winrar, and what it works. So without going into that deep, directly going to tell an easy procedure to convert Winrar trial version into full version. St

  • How to hack/Bypass windows logon password [VIDEO]

    In response to query asked by Ameer Hasan Malik Did you forget your windows login password? or want to access Admin account in school or colleges?  Whatever the reason is, this article can help you to get into the Admin account of y

  • Trick to identify the celebrity without staring and blinking eyes

    Have you seen the illusion pictures that ask you to stare on the picture for some seconds and then blink your eyes to see the celebrity? Images below are the examples of such kind of illusion.  Stare at the image for 20 seconds, then

  • Advantage of Chrome's Multi-Process Performance

    Google Chrome was one of the first browsers to have multiple processes. If you are a frequent Google Chrome user, then you probabely have seen sometimes, multiple “chrome.exe” processes running in your task manager, with multiple time

  • Reduce Chrome Memory usage using TooManyTabs extension

    Google Chrome was one of the first browsers to have multiple processes,  which creates a separate process for each tab. That means , if you have 5 tabs opened on your Chrome browser, then  you can see minimum 6&nb

  • Transform your Windows7 laptop into a Wi-Fi hotspot

    In today's time, not even  every home has a laptop or computer, but every member of family also own separate laptops or any other device with internet connection. And everyone want to use internet, prefect if you have a Wi-Fi at h

  • Sql Injection For Beginners: Tutorial 1

    Many times my readers have asked me to write about SQL Injection, but i always used to consider that its pretty easy way of hacking and may be everyone already know about it.  But now after years I think that, no, i was wrong.Still even ma

  • Beware Adobe Software Upgrade Notification Email



    An email pretend to come from Adobe has been widely spammed out, Which has a malware in attachment posing as upgrades for Adobe Acrobat Reader and Adobe X Suite Advanced. The malware attached is the 'Zeus Trojan horse' which is designed to steal banking information.
    The email is send from the spoofed address “Adobe Update Notification <no-reply@adobe.com>”  and Each email is slightly different, incorporating different reference numbers in the subject line, attached filename and message body....  Mainly it has subjects similar to "Adobe Software Critical Upgrade Notification ID: M29MGJW7CN3" or "Adobe Systems Software Critical Upgrade Notification ID: 6974438831048" or "Adobe Acrobat: Upgrade Needed, Tue, 6 Dec 2011 15:08:48 +0100" and has the  body similar to the following:
    Hello Dear,
    Adobe is pleased to announce new version upgrades for Adobe Acrobat Reader and Adobe X Suite
    Advanced features include:
    - Collaborate across borders
    - Create rich, polished PDF files from any application that prints
    - Ensure visual fidelity
    - Encrypt and share PDF files more securely
    - Use the standard for document archival and exchange
    To upgrade and enhance your work productivity today please open attached file.
    Copyright 2011 Adobe Systems Incorporated. All rights reserved.
    TrackNum: C0RCKD-7363931
    Adobe Systems Incorporated,
    Tue, 6 Dec 2011 13:21:16 -0300
    If you get the similar kind of message, dont trust the things like that. Currently only 5 of the 43 AV engines did detect the trojan at Virus Total. Hence, you cant rely on anti viruses for the newly designed viruses, your security is in your hand only, So be Careful.


    If you want more security tips, check out other posts under category Antivirus and Security Tips.


    author

    Written by:

    Surbhi is Founder of Techbyte4u.com. Follow her on Twitter or email her

    Bookmark and Share

    0 comments for this post

    Leave a reply

    TechByte4U on Facebook
    Popular Posts