Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


E-mail Continues to be Most Popular Cyber-Attack Technique - Mikko Hypponen

Chief Research Officer Mikko Hypponen of security company F-Secure, while speaking at the San Francisco, California-held RSA Conference 2011 during February 14-18, 2011 stated that e-mails continued to be the top medium for cyber-attacks but IM (instant messaging), chat and the Web weren't so popular. MoBMiT published this on February 18, 2011.

Characteristically, cyber-attacks through e-mail are personalized assaults wherein someone special in an organization receives a message that seems as being sent from somebody known to him. Moreover, the e-mails contain an attachment whose included file is relevant and makes sense to the reader, but this file usually copies the real one that the e-mail writer's organization supposedly uses.

Unfortunately, when the recipient clicks on the attachment, he doesn't know that a malicious program gets planted on his system. Stated Hypponen, this program, along with facilitating the attacker with admission into the victim's computer, facilitates him admission into all other things stored on those PCs within the network which the victim was allowed for accessing. ComputerWeekly.com published this on February 18, 2011. Besides, a few e-mails contained a web-link that'd actually redirect the user onto a malware-laden site.

Moreover, Hypponen further discussed one instance about an analyst on Internet safety who found malicious software, which had been effectively loaded onto the Nobel Peace Prize website. SearchSecurity.com published this on February 17, 2011. Interestingly, it wasn't long that the analyst got an e-mail acknowledging everything he did to address the problem together with a PDF file that invited him to attend the forthcoming Nobel Peace Prize function. But, the e-mail wasn't genuine while the PDF file in reality was a personalized assault.

Nonetheless, one pattern, which's steadfast, is that some specific kinds of files are used for carrying the malware programs. Says F-Secure, during 2010, 61% of personalized assaults depended on malevolent PDF files.

Meanwhile according to Hypponen, detecting online-spying continues to be difficult; so people shouldn't view unsolicited e-mail attachments, while in case anyone gets them, he must verify their authenticity from the senders.

Moreover, security specialists as well advise that users should have all appropriate security software installed on their systems.

Related article: E-Crime Reporting Format To Be Launched in July

ยป SPAMfighter News - 2/24/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page