How They Attack
Malware is a category of malicious code that includes viruses,
worms, and Trojan horses. Destructive malware will utilize
popular communication tools to spread, including worms sent through
email and instant messages, Trojan horses dropped from web
sites, and virus-infected files downloaded from peer-to-peer
connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.
How Do You Know
- Malware works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user
What To Do
- Only open email or IM attachments that come from a trusted source and that are expected
- Have email attachments scanned by Norton Internet Security prior to opening
- Delete all unwanted messages without opening
- Do not click on Web links sent by someone you do not know
- If a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM session
- Scan all files with an Internet Security solution before transferring them to your system
- Only transfer files from a well known source
- Use Norton Internet Security to block all unsolicited outbound communication
- Keep security patches up to date
No comments:
Post a Comment