123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Earlier First Lady Becomes An Aim Of Malware Sting

Profile Picture
By Author: Isaiah Henry
Total Articles: 220
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Surrounded by computer experts and a detail of Secret Service Men, even the presidential candidate was not immune to a malware scam. Millions of the former First Lady�s supporters and constituents received an email entitled �Hillary Clinton Full Video!!� The email did not contain a video of Mrs. Clinton; it had absolutely nothing to do with her in fact. Instead, the email contained an intrusive, annoying and sometimes dangerous malware scam.

Beginning in February, 2008, a widely-distributed email found its way around the globe. The particular email that put millions of computers at risk was entitled �Hillary Clinton Full Video�. In recent history, there has never been a campaign or election that garnered the attention this year�s presidential race has. Due in large part to the heightened interest in this race, many people opened the email hoping to learn more about the presidential candidate. There were destined to be disappointed when they opened the email and received malicious malware instead.

If you are not familiar with the term �malware�, don�t ...
... feel bad, you have plenty of company. Many frequent computer users incorrectly describe it as �a computer virus�. Even the media is confused and uses the terms interchangeably. That is incorrect because not all malware come in the form of viruses.

Let�s trace the steps of the Hillary Clinton �Video� email to see how malware scams can be spread. Finding the email in their inboxes, most people eagerly opened it without suspicion of any kind. They had no reason to be suspicious; after all, they believed it came from Hillary Clinton and appeared to be a valid email. That�s the problem; malware operates covertly and intrudes upon computers without the owner�s knowledge or consent.

Once opened, the email contained a link to a page set up to look like a Google search page. It was not affiliated with Google in any way; instead, it was the way malware was able to install itself onto the operating systems. Once in place, the malware scam is free to install spyware, adware, viruses, worms and rootkits. Some viruses are so dangerous they can cause moderate to severe damage to your computer.

How can you protect your computer from a potentially dangerous malware scam? There may be no way currently that you can absolutely protect your operating system, 100% of the time. However, there are things you can do to minimize your risks. Even though internet security software (like the popular Norton Internet Security and Spyware Doctor) doesn�t catch all malware; often, they block most of it.

Even Norton and other sophisticated internet security systems cannot guarantee absolute protection. The closest you can come to fool-proof protection is to open emails only from people/addresses with which you are completely familiar and comfortable.

Total Views: 362Word Count: 475See All articles From Author

Add Comment

Computers Articles

1. Beyond The Hype: Is An Enterprise Ai Service Provider Your Secret Weapon?
Author: Digiprima Technologies

2. Scrape 10 Largest Grocery Chains Data In Michigan For 2025
Author: FoodDataScrape

3. Extract An Indian Grocery Item Database With Pictures And Upc Codes
Author: FoodDataScrape

4. Monitor Competitor Offers And Discounts On Instashop Uae
Author: FoodDataScrape

5. Transforming Enrollment: How E2s Student Recruitment Software In Higher Education Drives Results
Author: Brenda Joyce

6. Latest Gaming Laptop Offers From Trusted Retailers
Author: Jack Williams

7. How To Scrape Food Aggregator Data From Zepto, Swiggy Instamart, And Blinkit Using Api?
Author: FoodDataScrape

8. Masters Of Cybersecurity Automation Tools: Defending The Digital Future
Author: Impaakt Magazine

9. Competitive Insights With Ifood Menu And Pricing Data Scraper
Author: FoodDataScrape

10. Innovate Your Businesses Through Ai Development Services
Author: brainbell10

11. Machine Learning App Development Guide
Author: brainbell10

12. Scrape Restaurant Menus Weekly From Deliveroo Uae
Author: FoodDataScrape

13. How To Stay Competitive In The Grocery Delivery Industry With Blinkit Api Scraping?
Author: FoodDataScrape

14. Scrape Upc Data For Indian Grocery Products For Retail Operations
Author: FoodDataScrape

15. Why Windows 11 Is The Ultimate Os Choice In 2025
Author: davudobuya55

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: