| 3:57 pm on Feb 3, 2004 (gmt 0)|
Finally they fixed the Address bar issue! Wanna know something? They said it was a feature not a bug or a error. Well they went ahead and blamed it on the hackers. Try the spammers and fraudsters getting credit card numbers, not the hackers. :D
But yes it is a cool issue, when clicking on the link usually masked with JS your address bar shows wellsfargo.com but it can go to a remote host elsewhere and your filling in your info.
| 4:03 pm on Feb 3, 2004 (gmt 0)|
The link to MS in the bottom of the Wash Post story has an error.
A fine example of phishing:
I recently had a bogus "PayPal" update page sent to me. It asked me to click a link and re-file all my personal data as they were "switching servers!" I forwarded it to the real PayPal and they confirmed that it was a fake. I didn't click on any of the links in the fake update, but they appeared as real PP addresses.
I just went to PP to see if they had indeed issued an update.
| 8:17 pm on Feb 3, 2004 (gmt 0)|
I just got on today and can't get the MS update window to finish loading, even tried rebooting. Either I've got a problem on my machine, too many people are trying to update right now -or- the MyDoom virus has hit $M servers.
Anyone else having this problem?
| 9:53 pm on Feb 3, 2004 (gmt 0)|
Downloaded the security patch, restarted, then a DOS screen said the file could not be updated and my computer might not function properly.
Went back to Windows Update, did it all again - same results. Glad to see MS is on top of things.
| 12:32 am on Feb 4, 2004 (gmt 0)|
Yea Goober, I had the same thing with PayPal. If you look at the email source, it goes to www.paypal-protect.com. I've gotten a lot of those and its scary how many people will fall for it because it looks so official.
| 9:03 pm on Feb 9, 2004 (gmt 0)|
someone created a minisite witch used these vulnerabilities to the max, and it was retty scary how "real" it all looked. I'm glad they fixed it so people don't complain to me about this stuff.