Last week here in the labs, we started to receive a small amount of email that caught my eye. Our Threatseeker network saw less than 40 of these messages on the same day. This number of messages was tiny, but there is a good reason for malware authors to send so few messages: it keeps their efforts under the radar, which may help them succeed in their ultimate goal.
The social engineering aspects of these messages are interesting. At first glance, the messages are almost believable. They are spoofed to look as though they came in from the LinkedIn support team. LinkedIn is another Web 2.0 site whose name is being used to try to gain the trust of the email recipient.
The screenshot below shows that the message looks as though it's a reply from LinkedIn support to a desperate user's request to import their contacts from LinkedIn.
More: http://securitylabs.websense.com/content/Blogs/3201.aspx

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic