Thank you for writing to us! Although we receive hundreds of e-mails every day, we really and truly read them all, and your comments, suggestions, and questions are most welcome. Unfortunately, we can manage to answer only a small fraction of our incoming mail.
Our site covers many of the items currently being plopped into inboxes everywhere, so if you were writing to ask us about something you just received, our search engine can probably help you find the very article you want.
Choose a few key words from the item you're looking for and click here to go to the search engine.
(Searching on whole phrases will often fail to produce matches because the text of many items is quite variable, so picking out one or two key words is the best strategy.)
We do reserve the right to use non-confidential material sent to us via this form on our site, but only after it has been stripped of any information that might identify the sender or any other individuals not party to this communication.
All Products | Support |
this is the latest version of
security update, the "September 2003, Cumulative Patch" update which
resolves all known security vulnerabilities affecting MS Internet
Explorer, MS Outlook and MS Outlook Express as well as three new
vulnerabilities. Install now to maintain the security of your computer
from these vulnerabilities, the most serious of which could allow an
malicious user to run executable on your computer. This update includes
the functionality of all previously released patches.
This update applies to
MS Internet Explorer, version 4.01 and later MS
Outlook, version 8.00 and later MS Outlook Express, version 4.01 and
Customers should install the patch at the earliest
How to install
Run attached file. Choose Yes on displayed dialog
How to use
You don't need to do anything after installing
Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable to
respond to any replies.
The names of the actual companies and products
mentioned herein are the trademarks of their respective owners.
Origins: Swen-A is another virus delivery disguised as a Microsft Security update mailing, a mass-mailing worm which uses its own SMTP engine to spread itself by e-mail (and through file-sharing networks) and attempts to kill antivirus and personal firewall programs. (As Microsoft has often warned their customers, they never distribute software directly via e-mail.)
The text of the message is as quoted above. Swen-A generally uses combinations of the adjectives "New(est)," "Current," "Latest," and "Critical" with "Patch," "Pack," "Upgrade" and "Update" (modified by "Internet," "Net(work)," "Microsoft," and "Security") to form subject lines such as the following:
New Microsoft Critical Patch
Current Microsoft Critical Patch
Current Critical Patch
Current Network Patch
Current Network Critical Upgrade
Current Net Security Pack
New Microsoft Security Pack
Current Microsoft Security Update
Microsoft Critical Patch
Newest Net Security Update
Newest Net Security Pack
Latest Net Security Patch
New Network Upgrade
Last Internet Critical Update
Latest Critical Pack
Latest Critical Upgrade
Latest Microsoft Security Update
Newest Net Update
New Network Update
New Net Critical Update
The attachment filename is usually a combination of "Installer," "upgrade," "update," "pack," or the letter "Q" followed by a string of digits (or letters), to which the extension ".exe" is appended, producing names such as the following:
This virus is similar in function to last year's Gibe worm and exploits a software flaw for which Microsoft provides a genuine patch. Symantec has also made a Swen-Aremoval tool available on its web site.