For example, suppose you have received an e-mail attachment in Microsoft Office 365 mailbox.
FORBES: Microsoft Betting BIG On Cloud With Windows 8 And Tablets
Your e-mail attachment will be a 30-minute movie of your nephew's Disneyland trip--a gigabit attachment.
PrettyPark spreads itself via an e-mail attachment bearing the icon of a character from South Park, a popular cartoon series.
You can watch Internet TV, listen to streaming music or play a first-person shooter while downloading a huge e-mail attachment, and not miss a thing.
ENGADGET: Bigfoot brings Killer bandwidth management to laptops via Wireless N module
Directed at users of Microsoft Word 97 and Word 2000, Melissa arrives innocently enough and can appear as an e-mail attachment sent from a boss, fellow employee or friend.
That makes it especially insidious, as users can infect their computer with software that gives hackers remote access to their desktops without downloading an e-mail attachment or running a program.
What hiring manager is going to make a decision based on an e-mail attachment when they can browse your LinkedIn and Facebook profiles, read the gory details in your blog and hit Google to find out more about you -- good or bad -- all in one sitting?
It also has an e-mail alert feature designed to send a snapshot of what the camera is seeing as an attachment to any e-mail address.
So, moving on, their second step is to send a spoofed e-mail (one that looks like it comes from a trusted friend or client) to one of your key employees or partners and the e-mail includes an infected attachment.
FORBES: Conversations On Cybersecurity Part 3: Why You Aren't Protected
The message, NAVCIRT Advisory 99-045, sent last week, said the so-called Year 2000 readiness programs are carried as an attachment to an e-mail message that may claim to originate from Microsoft Corp. or other well-known PC vendors.
In Safari, for example, you can Tweet a link to a Web page, send it via Messages or e-mail it as a link, a PDF attachment or inside the message's body.
The password to unlock the attachment was included in the body of the infected e-mail.
应用推荐