Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows IT

No-Click Phishing On The Way 301

An anonymous reader writes "MessageLabs has discovered a pretty nasty - though fairly crude - phishing scam which doesn't even require recipients to click on a link in order to hand over personal data. Simply opening the email is enough to activate a script which 'lies in wait for its victim' according to one report. The script rewrites the host files of the machine and directs users to a fake web page the next time they legitimately attempt to access an online banking page. ... However, this will only affect users who have Windows Scripting Host enabled and certain ActiveX controls, according to MessageLabs."
This discussion has been archived. No new comments can be posted.

No-Click Phishing On The Way

Comments Filter:
  • by rearl ( 262579 ) *
    ...doesn't execute HTML or scripts. Use it, be safe!
    • Just don't use ActiveX - biggest security risk ever. I sincerely hope no one here is using Outlook/Outlook Express.
      • by Frizzle Fry ( 149026 ) on Wednesday November 03, 2004 @02:32PM (#10714456) Homepage
        I sincerely hope no one here is using Outlook/Outlook Express.

        Did you read the article? It says " the most recent versions of Outlook, where such features are switched off as standard, will be protected." This has been the same with many recent exploits. They only affect old versions of ms software, but it immediately gets spun here to say that no one should be using the current, safe versions. It's similar to the recent status bar spoofing issue posted here which affected firefox rc1 and opera and pre-sp2 IE, but not sp2 IE, and was of course disscussed as being a "hole in IE".
        • IMHO, it shouldn't even have the "feature". You don't need ActiveX in emails.
          • But you get it because IE is used as the rendering engine, thereby ensuring that any security problems in one application are shared amongst as many others as possible.
          • You don't need ActiveX in emails.

            Don't tell me what I need or don't need in my software. It's off by default and if you don't want it, you don't have to do anything. But it's not for you to decide what I should or should not be able to do with my software. Other people may have different needs or use software in a different environment from you and this moralizing attitude that you can decide for everyone what their software should be able to do is frightening.
            • by Fulcrum of Evil ( 560260 ) on Wednesday November 03, 2004 @04:27PM (#10716132)

              Other people may have different needs or use software in a different environment from you and this moralizing attitude that you can decide for everyone what their software should be able to do is frightening.

              Name one. If you're passing activeX around in email, it could probably be done better some actual way. In the meantime, we all have to deal with the results of malicious activeX email.

              Incidentally, my moralizing attitude is that you shouldn't be dumping benzene upstream of me. Is that also not for me to decide?

          1. Did you read the article? It says " the most recent versions of Outlook, where such features are switched off as standard, will be protected." This has been the same with many recent exploits. They only affect old versions of ms software, but it immediately gets spun here to say that no one should be using the current, safe versions. It's similar to the recent status bar spoofing issue posted here which affected firefox rc1 and opera and pre-sp2 IE, but not sp2 IE, and was of course disscussed as being a "
      • I sincerely hope no one here is using Outlook/Outlook Express.

        Some of us don't have the choice (at work).

        At least I can install firefox, but mail clients that aren't OE are a big no-no.

    • Re:Pegasus Mail! (Score:3, Informative)

      by coolsva ( 786215 )
      Im sick of people suggesting not to use outlook/any other rich client.
      It is upto an individual to select if they want a rich experience in their emails. I, personally would prefer plain old text mails, but that is a choice I made. A rich client like outlook supports rich mail, but the MIME RFC clearly recommends that if the mail contains HTML, it should be a html/txt MIME attachment, with a plan text copy attached as the main message. Thus, a non rich mail client, can still display this primary message (w
    • Neither does Eudora 1.5.4. That's why I use it.

    • Last year I bought a new laptop. When I was setting up my apps, I decided to ditch Eudora and look for a better mail client.

      I tried out Pegasus Mail, Fox Mail, Mozilla mail, the Thunderbird standalone and PocoMail [pocosystems.com]. PocoMail was the only one that wasn't free, and it was the one I chose in the end.

      A number of reasons led to my choice:
      1 - Built in spam engine (Bayesian filtering added in 3.1) and the best auto-junkmail filter of the apps I tested, includes learning filters
      2 - UI totally configurable
      3 -
  • What (Score:5, Interesting)

    by Pingular ( 670773 ) on Wednesday November 03, 2004 @02:06PM (#10714042)
    are people that are, for example, at work, and can't turn off Windows Scripting Host and certain ActiveX controls? Not open emails? Surely there should be a solution to this.
    • Re:What (Score:2, Informative)

      by Z4rd0Z ( 211373 )
      Maybe they can install a different browser alongside IE for doing anything personal. If not, then they're just screwed I guess.

      I doubt many people would be affected anyhow. If I understand correctly, the attacker would have to know the URL you go to for online banking and replace it in your hosts file with a different site. It seems unlikely that it would work on too many people.
      • Re:What (Score:5, Insightful)

        by hoggoth ( 414195 ) on Wednesday November 03, 2004 @02:39PM (#10714567) Journal
        > the attacker would have to know the URL you go to for online banking and replace it in your hosts file with a different site. It seems unlikely that it would work on too many people

        Yeah, because it would be too hard to fill a hosts file with the URLs for Citibank, Chase, BankAmerica, and the rest of the top 10 or top 100 banks. Nobody could do that.

        • Right. No one could. Because I'm on OS X! Hah! I actually just replaced my banking login URL in my hosts file and it still loaded as normal. OS X must not consult the hosts file.
          • Bzzt, wrong! You have to restart networking services (in Redhat, not sure what OS X calls it) or reboot, first. Thank you, goodbye, you[ and your hosts file] are the weakest link.
            • Actually, you're wrong. We both were. You don't have to restart networking, because I just tried redirecting my banking URL and it worked. Hmm...now I'm not sure why it didn't happen the first time.
          • by Yakko ( 4996 )
            MacOS X does consult /etc/hosts if you put FFAgent in the LookupOrder for Netinfo. I've done this. It's not the default for MacOS X, though.
          • Re:What (Score:3, Informative)

            by pcardoso ( 132954 )
            it does, and you don't need to restart anything.

            the thing is, if you already accessed the url, the result for the dns query (or hosts file) is cached and it doesn't need to do the query again.. try it with a url you never accessed before.
      • Re:What (Score:3, Insightful)

        by Lord Ender ( 156273 )
        Informative? Read the writeup. It doesn't matter which browser you use. Opening email overwrites your hosts file (for you nooobz: your hosts file is like a local DNS server). Any browser that tries to go to your bank (by domain name) will go to their fake site instead.
    • Re:What (Score:3, Insightful)

      by RAMMS+EIN ( 578166 )
      These people don't have to do anything at all. Their company chose to use Windows, thus the company has to accept any consequences of that decision. If the company disallows users from making their Windows installation more secure, that's also the company's choice, and they have themselves to blame if it goes wrong.
      • Re:What (Score:3, Insightful)

        by CatLord42 ( 657659 )
        Right, and if you work at one of these companies and your information gets phished, they'll take care of it for you...
      • Re:What (Score:3, Insightful)

        by Heem ( 448667 )
        Policy also probably says that you can't use your work computer for anything but work, and unless you happen to be the finance person checking the company account, you shouldnt be doing your banking at work, sure everyone does it, but in a contract/liabilty sense - you werent supposed to.
    • Re:What (Score:5, Insightful)

      by Lord Kano ( 13027 ) on Wednesday November 03, 2004 @02:42PM (#10714619) Homepage Journal
      Yes. Don't do your personal banking at work.

      If the company's information gets phished because of inept IT staff, that's not your problem.

      Unless of course, you ARE the IT staff.

      LK
    • I guess you'll have to avoid doing critical home banking from work, then? Or perhaps use an alternate method of retrieving e-mails?
    • Re:What (Score:3, Insightful)

      by Deviate_X ( 578495 )
      It should be noted that Windows Scripting Host and "Certain ActiveX controls" have to be downloaded and installed manually and configured by the administrator, and are not installed and configured by default.

      Thats why this is classified as extremely low risk. It is simply a demonstration (concept) of a method of spoofing a website by modifying the host files.

    • are people that are, for example, at work, and can't turn off Windows Scripting Host and certain ActiveX controls? Not open emails? Surely there should be a solution to this.

      You might consider not doing your online banking from work? (Yeah, I'm a hypocrite, browsing /. from work, but it's lunch break right now.)

      Another possibility, if you have or can get enough control of the machine, is to install F/OSS alternatives. My corporate standard is Outhouse and Internet Exploiter, but I'm typing this on Fir

  • by bathmann ( 797470 ) on Wednesday November 03, 2004 @02:07PM (#10714051)
    No-click phising? That's infringing on Amazon's one-click patent!
  • by Anonymous Coward on Wednesday November 03, 2004 @02:08PM (#10714058)
    The virus apparently also redirects visitors of AOL Support Forums to Ask Slashdot, which explains the recent postings.
  • definition (Score:5, Informative)

    by Coneasfast ( 690509 ) on Wednesday November 03, 2004 @02:08PM (#10714060)
    for those who don't know what phishing is, see the definition [wikipedia.org]

    [Phishing] is the luring of sensitive information, such as passwords and other personal information, from a victim by masquerading as someone trustworthy with a real need for such information.
    • by Anonymous Coward

      for those who don't know what phishing is

      Slashdot - news for n00bs, stuff that confuses

    • Didn't this used to be called Social Engineering? One band does a stupid little prank and suddenly everybody uses their name.
  • by Anonymous Coward on Wednesday November 03, 2004 @02:08PM (#10714063)
    but you have to manual make the suggested changes to your /etc/hosts file after getting root access and using your editor of choice.

    not quite "no-click", but linux does support this feature.

    [/humor]
  • thats why (Score:2, Funny)

    by Anonymous Coward
    that's why I never keep any personal info on a computer. in fact I have outlook filled with entirely made up crap. names like 'hootie McBoob' and such
  • by nebaz ( 453974 ) on Wednesday November 03, 2004 @02:09PM (#10714085)
    I've set my mail display to always be text based. It's a lot easier to detect spam that way too as most of the onscreen stuff is usually garbage, or funnily "get a real mail client".
    • by Neil Watson ( 60859 ) on Wednesday November 03, 2004 @02:31PM (#10714448) Homepage
      Very true. Just recently I discovered that a business partner (telecom industry) has begun rejecting HTML email. I wonder if that policy will survive?
    • Yes, and there's another very good reason to read e-mail as plain text, not HTML:

      If you open HTML mail, stuff like pictures embedded in the HTML gets loaded, and that is one way spammers know that a) they've stumbled upon a valid e-mail address, and b) the user read the mail. I can imagine that with a spam run, a sudden surge in image loads from a target site might be used to calculate payments for the spammer, identify valid e-mail addresses used, use the latest browser exploit to install spy/addware, et

  • by Anonymous Coward on Wednesday November 03, 2004 @02:09PM (#10714089)
    For making products so easy to use that even someone you don't know can use them for you.
  • by RealAlaskan ( 576404 ) on Wednesday November 03, 2004 @02:09PM (#10714091) Homepage Journal
    However, this will only affect users who have Windows Scripting Host enabled and certain ActiveX controls, according to MessageLabs."

    Well, I was going to switch over from Linux to Windows, because I heard Bill Gates said that ``security is our top priority'', but now I think he must have been misquoted. Maybe I'll stick with Linux just a little longer, until Windows gets those last few little bugs ironed out.

  • by Colonel Panic ( 15235 ) on Wednesday November 03, 2004 @02:10PM (#10714099)
    I ssh into my ISP and use pine to read email. Been doing it this way for over 10 years. Some people find this a bit quaint, but I don't have to worry about any worm/virus/phishing issues.
  • Predictions (Score:4, Insightful)

    by Indy Media Watch ( 823624 ) on Wednesday November 03, 2004 @02:12PM (#10714131) Homepage
    this will only affect users who have Windows Scripting Host enabled and certain ActiveX controls

    Or in other words, this will probably not affect non-Windows or non-Internet Explorer users.

    Well we could see plenty of comments along those lines coming, but here's a further thought:

    Hey banks: All of your users have plastic cards that you issued. Mandate two-factor authentication already and watch Phishing scams go bye bye.
    • ???? two factor.. please explain?
    • Hey banks: All of your users have plastic cards that you issued. Mandate two-factor authentication already and watch Phishing scams go bye bye.

      You obviously have no idea how these scams work. Mostly, they trick the unsuspecting user into giving out their PIN number, and name and home address. As soon as you give out your PIN, all your "two-factor" authentication is useless.

      Why?? Here is why. Your bank card is absolutely trivial to duplicate.

      All a theif needs is a card from the same bank (easy to obtain by

      • by Scutter ( 18425 ) on Wednesday November 03, 2004 @03:22PM (#10715215) Journal
        until you go to an atm or restaurant or store with an improperly configured machine, that prints your whole card number on the slip, and not just the last few digits.

        Hey, guess what? Some machines print out the first eight and some print out the last four. I was cleaning a bunch of ATM receipts out of my car a few weeks ago and discovered that by combining several receipts, my entire account number and name was completely recoverable. Shred those puppies!
      • 1) Read up on two-factor. The idea is that both sides authenticate each other.

        One way to make card transactions more secure would be to implement something such that bank would generate a random transaction code, you punch it into your card, and it shows you a code to enter. That way you have to actually have the card.

        2) CC #s use a checksum. IIRC (its been a while since I played around with the checksum algorithm) it tended to reduce the search space by a factor of 100, i.e. only 1/100 numbers are val
  • by marktaw.com ( 816752 ) on Wednesday November 03, 2004 @02:16PM (#10714207) Homepage
    Overwriting your Hosts file is an obvious way to trick people, and Outlook is a prime target for this kind of hack, because it gives incoming email rediculous amounts of control over the rest of the computer.

    Remind me to tell my mother to start using Thunderbird and Firefox and install a firewall.
  • News Flash! (Score:4, Funny)

    by RAMMS+EIN ( 578166 ) on Wednesday November 03, 2004 @02:18PM (#10714231) Homepage Journal
    ActiveX is insecure!
    WSH is insecure!
    Windows is insecure!
    HTML mail can be used to exploit security flaws in user agents!

    Film at 11!
  • Innovation (Score:5, Funny)

    by pete-classic ( 75983 ) <hutnick@gmail.com> on Wednesday November 03, 2004 @02:18PM (#10714234) Homepage Journal
    Will the innovation [microsoft.com] never end?

    -Peter
  • by Anonymous Coward
    to set the file attribute on the hosts file to read only. ugh.
    • Yes, it would. (Score:5, Insightful)

      by Ungrounded Lightning ( 62228 ) on Wednesday November 03, 2004 @02:46PM (#10714668) Journal
      would it be so difficult ... to set the file attribute on the hosts file to read only.

      a) Why should Joe Newbie Windowsbuyer be expected to KNOW that he needs to change the permissions on the host file from the install defaults?

      b) If he can do it, he can UNdo it, and so can the bad guy's script.

      c) How many OTHER holes would he have to fix? Thousands? Tens of thousands? (Remember, he only has to miss ONE.)
      • a) Why should Joe Newbie Windowsbuyer be expected to KNOW that he needs to change the permissions on the host file from the install defaults?

        I believe the grandparent meant "would it be so difficult for MicroSoft to set the file attribute on the hosts file to read only".

        However your other points are valid.
    • You would be surprised. My wife runs XP and I recently tried changing one of the directories from read only to read-write. Windows happily applies the change but as soon as you click on the directory it just slaps the change back in again. I eventually had to copy the contents and kill the directory. I remember a couple of years back thinking I could solve my cookie problem by setting the cookies directory for IE to read-only. Imagine my surprise when I found out that IE reset my changes each time it starte
  • Well... (Score:3, Interesting)

    by northcat ( 827059 ) on Wednesday November 03, 2004 @02:18PM (#10714248) Journal
    This is what happenes when applications try to do more than what they are supposed to do. An email client is just supposed to read and send messages. All "dynamicness" and interactivity must be left to the appropriate programs. And this is exactly where *NIXes excell. You can't do a scripting exploit in 'mail' - Why? Because you can't do scripting. Let the current do-eveything software industry led by Microsft be a lesson to all programmers. Let's keep our programs simple. Let's continue the UNIX philosophy of one program for one task.
  • on my Linux machine you have to root it first to get even write access onto the hosts file :-D. But given the circumstances that most windows machines root every user and most windows users dont even have a clue about the existence of a hosts file on their machines, this is evil, but interesting.
  • by Anonymous Coward on Wednesday November 03, 2004 @02:26PM (#10714367)
    C:\WINDOWS\system32\drivers\etc>attrib hosts
    A R C:\WINDOWS\system32\drivers\etc\hosts

    I've got it set so only administrators can unset this flag.

    This means
    1) I'd have to run IE as administrator
    2) the script would have to change the permissions before doctoring the script

    First though it'd have to get past my spyware- and other-nasty- blockers
  • by billsf ( 34378 ) <billsf@cuba.calyx . n l> on Wednesday November 03, 2004 @02:26PM (#10714375) Homepage Journal
    The only aparently safe way to use mail is in a Unix shell. I've got my doubts about webmail too. Its a bit too slow compared to on-line mailing, but it may contain other unwanted elements, depending on the mailer. I've never had a real problem with any worm using mutt, the Unix mailer.

    Very recently some joker in France sent me a worm that prevented me from reporting the abuse. The solution was simple: Delete the worm, restart mutt and mail it to abuse@wanadoo.fr. (Personal note: Wanadoo sounds like wanabee, they are little known among 'my crowd' and somewhat of a worry. This is not intended as put down to the French!) So the moral here is simply if you use Unix, call it *BSD or Linux, you may not be 100% safe, but certainly safer than using Outlook which should be called "Lookout".

    Zero click exploits seem hardly new to me. Aren't most exploits, atleast in the past, done without the victim being imeadiately aware? This is from the computer-litterate camp.

  • by BigGar' ( 411008 ) on Wednesday November 03, 2004 @02:33PM (#10714470) Homepage
    If you want to gather a bunch of personal data and cover your butt at the same time start an ad company and release your virus, er demographics data gathering software and just claim it's business.
  • by Prince Vegeta SSJ4 ( 718736 ) on Wednesday November 03, 2004 @02:36PM (#10714529)
    HERE [microsoft.com]

    Windows Script Host (WSH) is a Windows administration tool.

    WSH creates an environment for hosting scripts. That is, when a script arrives at your computer, WSH plays the part of the host -- it makes objects and services available for the script and provides a set of guidelines within which the script is executed. Among other things, Windows Script Host manages security and invokes the appropriate script engine.

    WSH is language-independent for WSH-compliant scripting engines. It brings simple, powerful, and flexible scripting to the Windows platform, allowing you to run scripts from both the Windows desktop and the command prompt.

    Windows Script Host is ideal for noninteractive scripting needs, such as logon scripting, administrative scripting, and machine automation. WSH Objects and Services

    Windows Script Host provides several objects for direct manipulation of script execution, as well as helper functions for other actions. Using these objects and services, you can accomplish tasks such as the following:

    • * Print messages to the screen

      * Run basic functions such as CreateObject and GetObject

      * Map network drives

      * Connect to printers

      * Retrieve and modify environment variables

      * Modify registry keys

    Where Is WSH?

    Windows Script Host is built into Microsoft Windows 98, 2000, and Millennium Editions. If you are running Windows 95, you can download Windows Script Host 5.6 from the Microsoft Windows Script Technologies Web site (http://msdn.microsoft.com/scripting).

    Note You can also go to the web site listed above to upgrade your current engines. The version of WSH in Windows 98, 2000, and Millennium Editions is either version 1.0 or 2.0. You must upgrade to version 5.6 to get the new features.

  • by Sheepdot ( 211478 ) on Wednesday November 03, 2004 @02:44PM (#10714644) Journal
    However, this will only affect users who have Windows Scripting Host enabled and certain ActiveX controls, according to MessageLabs.

    That's like saying, "this will only affect users who have not yet switched to Linux or MacOS."

    I would say that a good 98% of installations have WSHost enabled. Those that are SP2 or up to date might have the latest MS patch that I believe sets a kill bit on the Internet Explorer side of WSHost scripting under all circumstances.

    This is also not really anything new. Spy and adware companies have been manipulating hosts files now for at least a year, no doubt phishers have done exactly the same thing, this is just the first reported time of it happening.

    One thing you have to keep in mind is that severay so-called security experts are very bright individuals but succumb to what some call: media-whoring. This is a specific instance of a "media-whoring" by Message Labs. Let me explain my proof of this: they use ASP and IIS as opposed to something like PHP and Apache.

    They are obviously not very concerned about legitimate security. There's a website that keeps track of the media fanatics: http://www.vmyths.com/

    The site is run by a guy who has over a decade of solid security experience. He knows when there is something legit to worry about, and he knows when something is hype.

    I suppose the best way to know is years and years of experience. If you read a lot of the security mailing lists, you'd be under the impression that the world was about to revert back to the stone age with the security threats.

    But the reality is, a huge amount of idiots exist that love to overhype the security risks when it comes to viruses and worms like "I Love You" and "Sasser". Most of us know when there is going to be a big problem, but there are a huge number of others that like to spread false info.

    There are others, like Mikko Hypponen of F-Secure that don't sell media hype, they sensationalize the truth. Yes, there have been instances of zombie-net owners selling their networks to spammers, but I have yet to actually see the sales, and I've been running a honeypot for well over a year now and track nearly a dozen different botnet herders.

    For the most part, it looks like botnetting is still used for two things, Americans (north and south america) for File Sharing/FXPing, and Germans for DDoSing. The Russians who have been spamming have been using IE exploits and web controls, not so much IRC connections. Thus, they cannot be truly considered "botnets".
  • by Grinler ( 817129 ) on Wednesday November 03, 2004 @02:49PM (#10714706)
    With the amount of crapware out there and the amount of guides and articles written about this subject you would think people would still be a bit more secure. Unfortunately it does not seem to be the case.

    This guide explains how to keep your damn computer from being stupidly compromised:

    Simple and easy ways to keep your computer safe and secure on the Internet [bleepingcomputer.com]

    Also heres a tutorial for switch from IE to firefox:

    Switching from Internet Explorer to Firefox [bleepingcomputer.com]
  • ...if you're required to go through an HTTP proxy anyway? (Like most corporate environments)

    Maybe the next generation of home ADSL routers would have one in their firmware and tout it as a "security feature"?
  • However, this will only affect users who have Windows Scripting Host enabled and certain ActiveX controls, according to MessageLabs.

    If only Microsoft would back out of this insistence on making the browser a completely general web applications framework with the ability to provide full access to local resources.

    Microsoft: split the HTML rendering engine out of the web client components, and get rid of the "security zones" hacks. You've been trying to come up with a design that lets you do this safely for over seven years now, and never succeeded in holding off attackers for more than a few weeks at the most... it's time to admit that even all the brilliant people at Microsoft (and you have some bloody amazing blokes over there) won't be able to make it work. Please consider that you may have been mistaken.
  • by jesser ( 77961 ) on Wednesday November 03, 2004 @04:04PM (#10715832) Homepage Journal
    Why is this attack lumped together with phishing attacks? It sounds to me like this attack involves a hole that lets the attacker run arbitrary code with the user's permissions, which could just as easily be used to install a keylogger.
  • This is another example of Microsoft's flawed security model -- which, no doubt, has its origin in the supremely arrogant and short-sighted idea that ultimately it should be Microsoft, and not the user, who has the last say on what happens to a computer.

    No regular user should ever need write access to the hostsfile. That's the way Linux works by default. If you do need to modify it, you probably are root anyway.

    To allow ordinary users to edit the hostsfile is stupid, but to allow some random person on
  • When I was younger, I used to write little batch files that would mess up my friends autoexec.bat file. I would give them a game on a disk, and then tell them to play the game they had to type go (go.bat). The batch file would then backup their autoexec.bat file and replace it with my tampered version. Then when they rebooted their computer, blammo.

    I would have it execute gwbasic programs that would continiously loop "your computer is screwed", or that would just bleep out sounds from the PC speaker. I

  • by LesPaul75 ( 571752 ) on Wednesday November 03, 2004 @04:14PM (#10715967) Journal
    The last line of defense for a lot of people was checking the actual URL of a link and seeing that it wasn't really "ebay.com" or "citibank.com," and it sounds like this flaw provides a way to defeat even that test. So this is pretty serious, it would seem, which is why it's surprising that the article is so sparse on details. Wouldn't it be good to know:

    1) What e-mail applications are vulnerable (can I get this through web-based mail)?
    2) What can be disabled to prevent this? Scripting? Active-X?
    3) Is a patch on the way?

    That article is pretty crummy.
  • by m.h.2 ( 617891 ) on Wednesday November 03, 2004 @04:24PM (#10716100) Journal
    *yawn*
  • Patented (Score:3, Funny)

    by punkkid ( 675057 ) on Wednesday November 03, 2004 @04:39PM (#10716261) Homepage
    Didn't Amazon patent no-click phishing? Oh wait, that was 1-click phishing. Sorry!
  • by bigberk ( 547360 ) <bigberk@users.pc9.org> on Wednesday November 03, 2004 @05:04PM (#10716576)
    Because your Windows account has non admin privileges, of course. A low privilege user can't overwrite the hosts files, or screw around with the HKLM registry. And personally, my own mail client [pc-tools.net] doesn't even try to support HTML or script-like thingies. Too difficult, too weird, unnecessary, dangerous.
  • Not a problem (Score:3, Interesting)

    by RzUpAnmsCwrds ( 262647 ) on Wednesday November 03, 2004 @06:01PM (#10717286)
    Recent versions of Outlook (2000 SP1 and beyond) and Outlook Express (IE SP1 and beyond) display emails in the restricted sites zone. Neither ActiveX nor Javascript are allowed to execute in the restricted sites zone.

    This also doesn't affect anyone using SP2 either.

    Move along, another already patched Microsoft vulnerability.

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful.

Working...