This is a special alert from The Funny/Alerts Newsletter. There are two new bugs out there and they're nasty ones.
BUGBEAR can use your email to send itself to all your friends, shut down your anti-virus program and open a "back door" for it's master to get into your computer with. From there the hacker can steal serial numbers, names & addresses, credit card numbers and a slew of other info. Or he can turn your computer into a "zombie" machine (remember the Charles Bronson movie SLEEPER?). Then, on his signal, your machine attacks another system along with other in what is known as a Distributed Denial Of Service, or DDOS for short. Next thing you know, the feds are knocking on your door and hauling your computer away - maybe even you with it.
OPASERV runs across networks (guess what... the internet is just a giant network) and can infect a machine without being downloaded! It takes advantage of any files, folders or drives that you have set to "Shared". Open your Network Neighborhood (or Network Places) and double-click on your computer. If you see any drives, folders or files listed there, you're vulnerable any time you're online. With a broadband connection, that's 24x7 (all day/every day) unless you're computer is turned off!
Carefully consider whether or not you need information shared on your computer. If you don't need it, you can easily un-share them: find them in My Computer (each one will have a hand under it) and then right-click. Select SHARING. Set it to NOT SHARED. Verify that it's no longer shared by going back to Network Neighborhood, opening your computer and hitting F5 (refresh). Repeat for other resources that you don't want to share.

===
CYBERSPACE ALERT:
Two new virii

W32.Bugbear@mm

Due to an increased rate of submissions, Symantec Security Response has upgraded this threat from a Category 2 to a Category 3.

W32.Bugbear@mm is a mass-mailing worm. It can also spread through Network shares. It has backdoor capabilities. The worm will also attempt to terminate the processes of various antivirus and firewall programs.

It is written in Microsoft Visual C/C++ programming language and compressed with UPX.

Also Known As: W32/Bugbear-A [Sophos], WORM_BUGBEAR.A [Trend], Win32.Bugbear [CA], W32/Bugbear@MM [McAfee], I-Worm.Tanatos [AVP], W32/Bugbear [Panda], Tanatos [F-Secure]

Type: Worm Infection
Length: 50,688 bytes
Systems Affected: Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Me
Systems Not Affected: Macintosh, Unix, Linux

---
W32.Opaserv.Worm

Due to an increased rate of submissions, Symantec Security Response has upgraded this threat from a Category 2 to a Category 3.

W32.Opaserv.Worm is a network-aware worm which attempts to replicate across open network shares. It will copy itself to the file "scrsvr.exe" on the remote machine. This worm also attempts to download updates from www.opasoft.com, although the site may have already been shut down. 

Indicators of infection include:
The existence of scrsin.dat and scrsout.dat in the root directory of the c: drive indicating a local infection (worm was executed on the local machine)
The existence of tmp.ini in the root directory of the c: drive indicating a remote infection (infected by a remote host)
HKLM\Software\Microsoft\Windows\Current Version\Run contains a string value named ScrSvr or ScrSvrOld which is set to "c:\tmp.ini"

Also Known As: W95/Scrup.worm [McAfee]
Type: Worm
Infection Length: 28,672 bytes
Systems Affected: Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Me
Systems Not Affected: Windows 3.x, Microsoft IIS, Macintosh, Unix, Linux

===
What our lawyers make us say:

THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.

Disclaimer of warranties and limitation of liability
This information is provided on an "AS IS" and "AS AVAILABLE" basis. We make no representations or warranties of any kind, express or implied, as to the information, content, materials, or products included, or mentioned within this information bulletin. You expressly agree that your use of this information is at your sole risk. The user assumes the entire risk as to the accuracy and the use of this document.

To the full extent permissible by applicable law, we disclaim all warranties, express or implied, including, but not limited to, implied warranties of merchantability and fitness for a particular purpose and freedom from infringement. We do not warrant that this information is accurate. We also will not be liable for any damages of any kind arising from the use of this information, including, but not limited to direct, indirect, incidental, punitive, and consequential damages.

Certain state laws do not allow limitations on implied warranties or the exclusion or limitation of certain damages. If these laws apply to you, some or all of the above disclaimers, exclusions, or limitations may not apply to you, and you might have additional rights.

[Copyrights and Trademarks] "FunnyAlert", "The Peer Group", and "The Peer Group, Unltd" are trademarks of The Peer Group, Unlimited. All other trademarks, trade name and product names are property of their respective owners. Copyright 1999, 2000, 2001, 2002 The Peer Group, Unltd. All rights reserved. 

_