Subject: | Email Attacks |
Date: | December 1, 2002 |
E-Mail AttacksAn E-mail attack will generally replicate itself, typically by using your contact list or address book to spread itself throughout your network and the world-at-large. If it is a worm, it will use your network. In many cases, it may be both and it may combine Trojan characteristics as well. Remember, E-mail doesn't have to be opened to release virus. If you didn't expect an attachment, consider deleting the message. But, even if you do expect an attachment, take care when you open the message. Safety first, take action...
Virus AlertsYou can monitor the latest virus and related threats using Symantec's tracking center at: http://www.symantec.com/avcenter.
All information herein is offered as-is and without warranty of any kind. Neither myself, nor contributors are responsible for any loss, injury, or damage, direct or consequential, resulting from your choosing to use any information presented here. |
Mastery Series index page
Until next time... keep e-learning