How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak.

According to an online poll conducted by CNN: 32% of respondents were infected with this malicious virus. At the pick, each of every 17 emails contained sobig.F! Internet service provider AOL says it scanned 40.5 million emails and found the virus in more than half of them. Sobig accounted for 98 percent of all viruses found in these emails.

What is Sobig.F virus?

This is a worm type of virus. Which means it is an executable program that installs enhancement to your Windows operating system. The 'F" implies that it is the sixth of the family of Sobig viruses. The first one was launched in the beginning of this year. The latest attack was started on August 19.

According to some experts, Sobig.F was first posted to a porn Usenet group and spread from there. It is timed to deactivate itself on September 10. The pre-built deactivation mechanism itself is a worrisome factor. Most experts think this means there are more to come!

How it works?

Sobig.F comes along with an email with subject headers like Your details, Thank you!, Re: Thank you!, Re: Details, Re: Re: My details, Re: Approved, Re: Your application, Re: Wicked screensaver or Re: That movie. The body of the message is quite short and usually contains either "See the attached file for details" or "Please see the attached file for details."

Once the file is opened, Sobig.F resends itself using a built-in mailing program to e-mail addresses from the infected computer. As a sender is address it shows one of the e-mails randomly selected from the computer's address book. The worm was also supposed to attempt to retrieve an URL from a predetermined list of 20 master servers on a certain date and time. The content of that URL was to be downloaded and executed on the infected machines. Luckily those servers were identified right away and shut down.

How to protect yourself against it?

If your computer is infected or you have doubts, first thing you should do is: to check and clean up your computer from this virus. Although, it is set to deactivate on September 10, which means it will no longer multiply itself, however, left untouched, it might attempt to update itself, once the newer version of the virus comes out.

Suggestion One:

1. If you do not have latest version of anti-viruses installed, go to the Symantec's following page: http://www.symantec.com/avcenter/venc/data/[email protected],

2. Down load the Sobig.F removal tool for completely free of charge.

3. Install and run it by strictly following the steps described on the page.

Suggestion Two:

Download the latest security patches for your version of Windows and install them.

Suggestion Three:

If you are using Microsoft Outlook, follow the steps below to stop them appearing in your inbox:

- Open Outlook

- Click on "Tools" from main menu

- Choose Rules Wizard from the drop down menu

- On the page "Apply changes to this folder": Click on "New"

- Select "Start creating a rule from Templates"

- Choose "Move messages based on content"

- Click on " specific words" link from the box at the bottom

- A small window will appear, add each and every phrase scrupulously

from the list below:

Re: Thank you!

Thank you!

Your details

Re: Details

Re: Re: My details

Re: Approved

Re: Your application

Re: Wicked screensaver

Re: That movie

And

your_document.pif

document_all.pif

thank_you.pif

your_detail s.pif

details.pif

document_9446.pif

application.pif

wicked_scr.scr

mov ie0045.pif

- Once finished click on "OK" to close the window.

- Click on the link "specified" at the same box

- Open a new folder by clicking on the "New" button under the

name "Virus Spam"

- Click on "OK"

- Click on "Finish"

- From now on all emails with the above mentioned phrases and

attachments will be moved to the "Virus Spam" folder.

- All you have to do is delete the emails, which will appear there.

A few more cautions:

Don't open any executable attachment in an email, unless you are hundred percent sure that this is a legitimate file that you have been expecting.

Install an anti-virus program and update it on time, at the end, this might be the best possible solution to protect ourselves from these ugly online creatures!

Nowshade Kabir is the founder, primary developer and present CEO of Rusbiz.com ? a Global B2B Exchange with solutions to create e-catalog, Web store, business process management and other features to run a business online. You can read various articles written by Nowshade Kabir at http://ezine.rusbiz.com.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Politico

'Too inconvenient': Trump goes rogue on phone security
Politico
President Donald Trump uses a White House cellphone that isn't equipped with sophisticated security features designed to shield his communications, according to two senior administration officials — a departure from the practice of his predecessors ...
Trump reportedly ignores 'inconvenient' security rules to keep tweeting on his iPhoneThe Verge
Trump refuses security measures for his iPhone: reportMarketWatch
Trump's cellphones reportedly lack 'sophisticated security features'New York Post
The Hill -Engadget -Albuquerque Journal -Vox
all 124 news articles »

ZDNet

Spectre chip security vulnerability strikes again; patches incoming
ZDNet
Since the CPU vulnerabilities Spectre and Meltdown showed an entirely new way to attack systems, security experts knew it was only a matter of time until new assault methods would be found. They've been found. Jann Horn, a Google Project Zero security ...
Processor Makers Confirm New Security Flaws, So Update Your Shit ...Gizmodo
Intel details fourth Spectre-style CPU security flawEngadget
Google, Microsoft find another Spectre, Meltdown flawCNET
Microsoft Security Update Guide -Intel Newsroom -Intel -YouTube
all 37 news articles »

Digital Trends

The Ooma Butterfleye security camera keeps recording even in a power outage
Digital Trends
A power outage won't mean a security outage. At least, not if you have Ooma on your side. The smart home company introduced a new video security camera that boasts facial recognition, offline recording, and a host of other features to help keep you and ...


Findlay school board weighing security measures
The Courier
Ideas include adding security personnel throughout the district — currently they're based at the high school and go elsewhere as needed — and employing mental health “liaisons” who would work in schools and with “outside agencies,” Kurt said at ...


Washington Post

They would wound our security to save the president's skin
Washington Post
When one exposes an asset's identity, lives are put at risk and American national security is damaged in the short- and long-term. (What government or individual is going to go out on a limb to protect the United States?) Former CIA director Michael ...


Us Weekly

Royal Police Expert Explains How Duchess Meghan Will Get Special Security Training Now That She's a Royal
Us Weekly
“The British style of security is relatively low-key though, with her protection officers especially trained to blend in to all sorts of environments,” Jagger notes. “Whilst on official public duties with Prince Harry, she will receive a high security ...


Leader-Telegram

Eau Claire school board urges security upgrades for Roosevelt Elementary School
Leader-Telegram
A decision about whether to build a new Roosevelt Elementary School won't come until after Eau Claire school district school population projections are more complete, but school board members said security upgrades at the school should happen sooner ...

and more »

Geneva County Schools adding armed security to schools in the fall
WSFA
If you have a child in the Geneva County School System, expect to see security on campus in the fall. The school system announced they will have armed security personnel on school campuses. The superintendent says it's a security measure they've been ...

and more »

Foreign Policy (blog)

Security Brief: Trump Has Second Thoughts on DPRK; Pompeo's 'Plan B' for Iran
Foreign Policy (blog)
Late last week, North Korean officials threatened to pull out of the summit planned for June 12 in Singapore after picking up on comments by National Security Adviser John Bolton that the U.S. favors a “Libyan model” for North Korea — one that left ...
'I Think It's Dead:' Nat'l Security Expert Doubts Trump-Kim Summit Will HappenFox News Insider

all 1,093 news articles »
Google News

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More