Thank you for writing to us! Although we receive hundreds of e-mails every day, we really and truly read them all, and your comments, suggestions, and questions are most welcome. Unfortunately, we can manage to answer only a small fraction of our incoming mail.
Our site covers many of the items currently being plopped into inboxes everywhere, so if you were writing to ask us about something you just received, our search engine can probably help you find the very article you want.
Choose a few key words from the item you're looking for and click here to go to the search engine.
(Searching on whole phrases will often fail to produce matches because the text of many items is quite variable, so picking out one or two key words is the best strategy.)
We do reserve the right to use non-confidential material sent to us via this form on our site, but only after it has been stripped of any information that might identify the sender or any other individuals not party to this communication.
Claim: A form of malware can be activated by prompting Internet Explorer users to press the F1 key.
Example:[Collected via e-mail, March 2010]
Microsoft has issued a warning against a new virus that they do not yet have a patch for ... it is attached to Internet Explorer and the user will get a window prompt requesting them to press the F1 key. Doing this then causes malicious code to be run on your computer.
So ... DO NOT press F1 if you are prompted - no matter how many times. Evidently, it will pester you repeatedly. Either X out of the window or Explorer all together.
Thanks for your diligence in keeping these viruses to a minimum.
Origins: As noted in a 1 March 2010 Microsoft Security Advisory, a vulnerability in VBScript opened the door to a potential Windows-based exploit tied to luring users of Microsoft's Internet Explorer web browser software into pressing the F1 key:
Microsoft is investigating new public reports of a vulnerability in VBScript that is exposed on supported versions of Microsoft Windows 2000, Windows XP, and Windows Server 2003 through the use of Internet Explorer. Our investigation has shown that the vulnerability cannot be exploited on Windows 7, Windows Server 2008 R2, Windows Vista, or Windows Server 2008. The main impact of the vulnerability is remote code execution. We are not aware of attacks that try to use the reported vulnerabilities or of customer impact at this time.
The vulnerability exists in the way that VBScript interacts with Windows Help files when using Internet Explorer. If a malicious Web site displayed a specially crafted dialog box and a user pressed the F1 key, arbitrary code could be executed in the security context of the currently logged-on user. On systems running Windows Server 2003, Internet Explorer Enhanced Security Configuration is enabled by default, which helps to mitigate against this issue.
However, this vulnerability was addressed in an April 2010 Microsoft security update, so only users of Microsoft Windows 2000, Windows XP, or Windows Server 2003 platforms who do not have automatic updates enabled and who have not manually applied any security updates since April 2010 would still be at risk for the F1 key exploit.