%3CLINGO-SUB%20id%3D%22lingo-sub-724376%22%20slang%3D%22en-US%22%3EThe%20Case%20of%20the%20Father-in-Law%E2%80%99s%20Scareware%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-724376%22%20slang%3D%22en-US%22%3E%0A%20%26lt%3Bmeta%20http-equiv%3D%22Content-Type%22%20content%3D%22text%2Fhtml%3B%20charset%3DUTF-8%22%20%2F%26gt%3B%3CSTRONG%3E%20First%20published%20on%20TechNet%20on%20Apr%2018%2C%202015%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CP%3EWe%20all%20know%20people%2C%20friends%20and%20family%2C%20that%20have%20fallen%20for%20the%20%E2%80%9Cyour%20system%20is%20infected%2C%20press%20here%20to%20get%20protected%E2%80%9D%20scams%20that%20are%20becoming%20even%20more%20common%20since%20I%20first%20wrote%20about%20them%20in%20my%20The%20Antispyware%20Conspiracy%20blog%20post%20in%202005.%3C%2FP%3E%0A%20%20%3CP%3E%3CIMG%20alt%3D%22image%22%20border%3D%220%22%20height%3D%22373%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-52-36-metablogapi%2F2437.image_5F00_thumb.png%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F121446i45AEFF8571967D89%22%20style%3D%22border-bottom%3A%200px%3B%20border-left%3A%200px%3B%20display%3A%20inline%3B%20border-top%3A%200px%3B%20border-right%3A%200px%22%20title%3D%22image%22%20width%3D%22554%22%20%2F%3E%3C%2FP%3E%0A%20%20%3CP%3E%3C%2FP%3E%0A%20%20%3CP%3E%3CIMG%20alt%3D%22image%22%20border%3D%220%22%20height%3D%22403%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-52-36-metablogapi%2F8787.image_5F00_thumb_5F00_1.png%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F121447i83C3EAE93A05E205%22%20style%3D%22border-bottom%3A%200px%3B%20border-left%3A%200px%3B%20display%3A%20inline%3B%20border-top%3A%200px%3B%20border-right%3A%200px%22%20title%3D%22image%22%20width%3D%22554%22%20%2F%3E%3C%2FP%3E%0A%20%20%3CP%3E%3C%2FP%3E%0A%20%20%3CP%3E%3C%2FP%3E%0A%20%20%3CP%3E%3CIMG%20alt%3D%22image%22%20border%3D%220%22%20height%3D%22226%22%20original-url%3D%22http%3A%2F%2Fblogs.technet.com%2Fcfs-file.ashx%2F__key%2Fcommunityserver-blogs-components-weblogfiles%2F00-00-00-52-36-metablogapi%2F0361.image_5F00_thumb_5F00_2.png%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F121448i241550AA980B62F2%22%20style%3D%22border-bottom%3A%200px%3B%20border-left%3A%200px%3B%20display%3A%20inline%3B%20border-top%3A%200px%3B%20border-right%3A%200px%22%20title%3D%22image%22%20width%3D%22554%22%20%2F%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-724376%22%20slang%3D%22en-US%22%3EFirst%20published%20on%20TechNet%20on%20Apr%2018%2C%202015%20We%20all%20know%20people%2C%20friends%20and%20family%2C%20that%20have%20fallen%20for%20the%20%E2%80%9Cyour%20system%20is%20infected%2C%20press%20here%20to%20get%20protected%E2%80%9D%20scams%20that%20are%20becoming%20even%20more%20common%20since%20I%20first%20wrote%20about%20them%20in%20my%20The%20Antispyware%20Conspiracy%20blog%20post%20in%202005.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-724376%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMark%20Russinovich%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1074212%22%20slang%3D%22en-US%22%3ERe%3A%20The%20Case%20of%20the%20Father-in-Law%26amp%3B%238217%3Bs%20Scareware%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1074212%22%20slang%3D%22en-US%22%3E%3CP%3EUnfortunately%20the%20Phishing%20attacks%20are%20still%20among%20the%20most%20popular%20and%20most%20effective%20type%20of%20attacks%20used%20in%20cyber%20attacks%20today%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft
First published on TechNet on Apr 18, 2015

We all know people, friends and family, that have fallen for the “your system is infected, press here to get protected” scams that are becoming even more common since I first wrote about them in my The Antispyware Conspiracy blog post in 2005.

image

image

image


1 Comment
Honored Contributor

Unfortunately the Phishing attacks are still among the most popular and most effective type of attacks used in cyber attacks today