<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malware &#8211; Blogvaria</title>
	<atom:link href="https://blog.evaria.com/key/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.evaria.com</link>
	<description>The personal pages</description>
	<lastBuildDate>Mon, 14 Jul 2008 13:21:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
<site xmlns="com-wordpress:feed-additions:1">1077093</site>	<item>
		<title>Homer Simpson spreads malware</title>
		<link>https://blog.evaria.com/2008/homer-simpson-spreads-malware/</link>
					<comments>https://blog.evaria.com/2008/homer-simpson-spreads-malware/#comments</comments>
		
		<dc:creator><![CDATA[Max C]]></dc:creator>
		<pubDate>Tue, 15 Jul 2008 13:14:49 +0000</pubDate>
				<category><![CDATA[Internet stuff]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[simpson]]></category>
		<guid isPermaLink="false">http://blog.evaria.com/?p=905</guid>

					<description><![CDATA[A screen name once connected to animated TV dad Homer Simpson is being used to spread malware. In a 2003 episode of The Simpsons, writers revealed that Homer&#8217;s e-mail address &#8230; ]]></description>
										<content:encoded><![CDATA[<p>A screen name once connected to animated TV dad Homer Simpson is being used to spread malware.</p>
<p>In a 2003 episode of The Simpsons, writers revealed that Homer&#8217;s e-mail address was chunkylover53@aol.com. Prior to the episode&#8217;s airing, the address was registered by one of the show&#8217;s writers, who used it to answer hundreds of e-mails from Simpsons fans. Years later, the chunkylover53 screen name has resurfaced, and it&#8217;s now being used to distribute a trojan disguised as a Simpsons movie file.</p>
<p>According to FaceTime malware research director Chris Boyd, chunkylover53 is sending out auto-reply messages to users which promises a special exclusive episode of the show available for download. The link in the message leads to an executable file. Upon launching the trojan, the user is presented with a fake error message which is followed by several real error messages and, finally, a blank screen. Upon restarting, the system will run noticeable slower and be prone to crashes.</p>
<p>So again, it&#8217;s not a good idea to blindly click links in emails without verifying the authenticity of the sender. We should know better by now don&#8217;t you think?</p>
<p>Source: <a href="http://www.vnunet.com/vnunet/news/2221476/homer-simpson-accused-spreading" target="_blank">vnunet.com</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.evaria.com/2008/homer-simpson-spreads-malware/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">905</post-id>	</item>
	</channel>
</rss>
