• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

I don't work in IT, but this seems pretty bad.

We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:
 
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?
 
Yep, that's pretty stupid... and they're going to look even more foolish when someone in management replies to everyone saying DON'T click on the link in that e-mail... possibly followed by someone replying to everyone complaining that they're receiving too much e-mail because of abuse of the "reply to all" function 🙂
 
Originally posted by: ultimatebob
Yep, that's pretty stupid... and they're going to look even more foolish when someone in management replies to everyone saying DON'T click on the link in that e-mail... possibly followed by someone replying to everyone complaining that they're receiving too much e-mail because of abuse of the "reply to all" function 🙂

Please remove me from this list.
 
Originally posted by: DisgruntledVirus
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?

My question is, why are they not filtering their email so this isn't even an issue? Any standard mail virus scanning or filtering service will make this a non issue.
 
Originally posted by: Nightfall
Originally posted by: DisgruntledVirus
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?

My question is, why are they not filtering their email so this isn't even an issue? Any standard mail virus scanning or filtering service will make this a non issue.

My question is, why are they using Windows?


 
Originally posted by: DisgruntledVirus
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?

Why not. Many programs we use are .exe where I work. All end users here need to be able to run .exe files or the company would shut down.
 
Originally posted by: Arcadio
Originally posted by: Nightfall
Originally posted by: DisgruntledVirus
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?

My question is, why are they not filtering their email so this isn't even an issue? Any standard mail virus scanning or filtering service will make this a non issue.

My question is, why are they using Windows?

Maybe because they want to spend more time getting work done and less time training users.
 
Originally posted by: Arcadio
Originally posted by: Nightfall
Originally posted by: DisgruntledVirus
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?

My question is, why are they not filtering their email so this isn't even an issue? Any standard mail virus scanning or filtering service will make this a non issue.

My question is, why are they using Windows?

Uhh maybe because you can't use Linux/Mac in most office enviornments due to end users stupidity, and a lot of programs that companies use are Windows only.

Find the "h" key yet?

Originally posted by: ICRS
*snip*
Why not. Many programs we use are .exe where I work. All end users here need to be able to run .exe files or the company would shut down.

Okay if you have to use .exe's then

Originally posted by: Nightfall

My question is, why are they not filtering their email so this isn't even an issue? Any standard mail virus scanning or filtering service will make this a non issue.

That (which should be done anyways)
 
Executeables don't even get to us. The Exchange server blocks everything like that, even on outgoing mail. I can't even send ASP files, I have to rename them as SAM 🙁
 
We shoot those down at our firewall. I also wonder why they don't do the same. It has been standard practice everywhere I have worked.
 
Originally posted by: Sphexi
Executeables don't even get to us. The Exchange server blocks everything like that, even on outgoing mail. I can't even send ASP files, I have to rename them as SAM 🙁

We can't even send .vb or .cs files.
 
Originally posted by: Arcadio
Originally posted by: Nightfall
Originally posted by: DisgruntledVirus
Originally posted by: meltdown75
We got an email from our tech support staff warning against running an executable from a bogus Microsoft Update link.

In the email, at the bottom, they were kind enough to include the link from the malicious email. It's an active link... clicking it asks if you would like to save or open the .exe from the fake Microsoft link.

Is it just me or is it kind of bad practice to forward the link you are warning people about IN the advisory email?

This on a day where we already had to run 2 updates to our software.

I'm no odds expert but I'd be willing to bet some people are going to scroll right to the bottom, click the link and run the .exe.

:facepalm:

My question is why are they letting .exe's be run by end users?

My question is, why are they not filtering their email so this isn't even an issue? Any standard mail virus scanning or filtering service will make this a non issue.

My question is, why are they using Windows?

Because they're evil atheists out to get you
 
Originally posted by: AnonymouseUser
Run the executable and let IT sort it out. That should teach them.

asshole.

I hate people like you.

But if it were my IT.

.exe in emails? hell no.
 
The .exe's not being attached in the email. There's a link that the user clicks which directs them to the exe on the web. Can you block html links in emails?
 
Originally posted by: indamixx99
The .exe's not being attached in the email. There's a link that the user clicks which directs them to the exe on the web. Can you block html links in emails?

You could just block the site at the firewall either way....
 
Back
Top