Subject: Email Attacks
Date:  December 1, 2002

 

E-Mail Attacks

An E-mail attack will generally replicate itself, typically by using your contact list or address book to spread itself throughout your network and the world-at-large.  If it is a worm, it will use your network.  In many cases, it may be both and it may combine Trojan characteristics as well.

Remember, E-mail doesn't have to be opened to release virus.  If you didn't expect an attachment, consider deleting the message.  But, even if you do expect an attachment, take care when you open the message.

Safety first, take action...

  1. Make sure that your anti-virus program is pre-screening your messages and all of the attachment files before your system is creating a file on your drive.
  2. If you don't want a message, simply delete it from your inbox.  You need not delete the attachment as a separate step.  It will be deleted from your inbox together with the unwanted message.
  3. Update your antivirus definitions.
  4. Do not to open HTML attachments or click on embedded links in e-mail files unless you explicitly trust the source.
  5. In a case of mass-mailing technology, the e-mail may appear to come from a trusted source.  So, raise browser security levels and configure your network security software to display alerts if a program or a Web call function occurs.
     

Virus Alerts

You can monitor the latest virus and related threats using Symantec's tracking center at: http://www.symantec.com/avcenter.

Next topic: Windows Protection
Previous: Hacker Attacks

All information herein is offered as-is and without warranty of any kind. Neither myself, nor contributors are responsible for any loss, injury, or damage, direct or consequential, resulting from your choosing to use any information presented here.

Mastery Series index page

Until next time... keep e-learning

- Eric
Click the image 
 to open the 
 life-long learning pages

  News

  Portals

  TaoZenTruth

  Julien's Pages

  9/11 Memorial

  Entertainment