Porn News

See All Her Tattoos! Hoax emails of naked Angelina Jolie cause 80% of computer viruses

WWW- [The Daily Mail]- Want to see naked pictures of your favourite Hollywood actresses? It could cost you an expensive trip to your local computer repair shop if you do.

Fake emails claiming to offer nude photographs of Angelina Jolie, Nicole Kidman, Natalie Portman, Milla Jovovich and pixelated videogame babe Lara Croft are behind 80 per cent of computer viruses last month, according to experts.

For, though claiming to contain shocking pictures of female celebrities, the emails, once opened, install a malicious rootkit.

“These emails are masquerading as pornographic content, tempting the unwary into opening a file on their Windows computer which will install a rootkit and download further malicious code from the internet,” said Graham Cluley, senior technology consultant for Sophos.

“This kind of social engineering trick is nothing new – in fact it has been used so often by cybercriminals that it sometimes feels like it’s been around since the days of the silent movies.

“However, that hasn’t stopped it from being an effective way to fool many people into running code designed to allow hackers to break into computers.

IT security and control firm Sophos is urging computer users to think before opening unsolicited email attachments following the widespread spam campaign.

The emails, which typically have an attached file called amazing.zip or shocking.zip, contain a message similar to:

Good morning, old chap!

Shocking video of nude Angelina Jolie. See it in your attachment.

Best Regards.

Mr Cluley said: “The best way to defend yourself is to practise safe computing. That means not only running an up-to-date anti-virus, security patches and firewall – but also exercising caution over what programs you decide to run on your computer.

“You should always think twice before opening a file that unexpectedly arrives in your email inbox.”

“Rootkits are software frequently used by third parties – usually a hacker – to hide other software and processes using advanced stealth techniques.

“Malicious code, such as spyware and keyloggers, can be invisibly cloaked from detection by conventional security products or the operating system making them hard to detect.

“Hackers use rootkit technology to maintain access to a compromised computer without the user’s knowledge, so it’s important to be properly defended from these sort of threats.”

312 Views

Related Posts

Aylo Challenges EU’s DSA Mandate to Reveal Legal Names of Advertisers, Including Performers

BRUSSELS — Aylo has filed an appeal with the Court of Justice of the European Union (CJEU) challenging the EU's Digital Services Act mandate to disclose the legal names of advertisers, including performers, in a publicly accessible database. As XBIZ…

Blake Blossom and OnlineGirl_ to Co-Host the 2025 AVN Awards Show

AVN Media Network is pleased to announce that adult entertainment superstars Blake Blossom and OnlineGirl_ will co-host the 2025 AVN Awards Show in January.

Meta Admits to Updating Database of Banned Images Based on ‘Media Reports’

MENLO PARK, Calif. — Meta has told its Oversight Board that the company relies on “media reports” when deciding to add images to its permanent database of banned content for its platforms, including Instagram and Facebook.The disclosure came in a…

Flirt4Free Set to Launch $100K Summer Cam Contest

Camming network Flirt4Free on Wednesday announced the upcoming launch of its Hot Summer All-Stars Tournament.

Popular Pakistani Actor and Director Yasir Hussain Proposes Legalizing Porn

ISLAMABAD — Prominent Pakistani actor, director and TV personality Yasir Hussain sparked debate in the majority-Muslim country after suggesting that pornography should be legalized there and society should own up to so many Pakistanis being already habitual consumers. Speaking candidly…

Leave a Reply

Your email address will not be published.