lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: fabio_weissert at hotmail.com (Fabio Weissert)
Subject: FW: Last Microsoft Patch

yes, a lot of got and are still getting this. Before posting to here, please 
consider reading about MS's security procedures here: 
http://www.microsoft.com/security/antivirus/authenticate_mail.asp


Thanks

Fabio



>Anybody else get this? Looks legit, originating address is from msnbc.com. 
>But can't believe even Microsoft would be this stupid after the rash of 
>trojan-attached "patch announcements" lately. Plus all security people have 
>been saying that Microsoft would never email a patch out. Or are they 
>thinking, "Send this out so all the stupid people will click on this before 
>they click on a real trojan? Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA 
>Information Security Engineer DP Solutions cpurdy@...ol.com
>
>----------------------------------------
>
>If you spend more on coffee than on IT security, you will be hacked. What's 
>more, you deserve to be hacked. -- former White House cybersecurity zar 
>Richard Clarke
>
>-----Original Message----- From: admin-owner@....net 
>[mailto:admin-owner@....net]On Behalf Of Technical Services Sent: Tuesday, 
>October 14, 2003 11:33 AM To: MS Corporation User Subject: [inbox] [admin] 
>Last Microsoft Patch
>
>
>Microsoft All Products | Support | Search | Microsoft.com Guide Microsoft 
>Home
>
>
>Microsoft User
>
>

_________________________________________________________________
Protect your PC - get McAfee.com VirusScan Online 
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ