Monday, April 13, 2009

Is E-mail charm or harm?

E-mail (electronic mail) is possibly the greatest invention of online communication. It is an easy, quick and relatively low cost communication way for both personal and business usage. With expanding number of global Internet user and technology enhancement, email has emerged as the main medium for information exchange and document delivery.

With billions of email transaction daily, it has created a pathway for the cyber criminals to deliver malware into targeted network system. Malware is one of the most menacing software and it is designed to damage a computer system and open pathway for unauthorized access to the computer’s data storage.

Although, many organizations have installed firewall system to prevent intrusion and unauthorized access to its network, however every security system has its own loophole, so does the firewall system. Firewall may be effective to filter malware-attached-emails from unauthorized users, yet it is defenseless to sort out threats from authorized senders. Firewall does not look into the content of authorized user’s emails; therefore malware are able to enter an organization’s network via emails from business partners, product or information enquirer, employees’ personal email and many more.

Obviously, firewall system is not able to stop cyber criminals from breaching into an organization security system completely. Though it is important to constantly update the organization’s security software and hardware tools, consistent training to the IT workforce must not be overlooked. An excellent IT security infrastructure combines the finest and up-to-date security software and hardware with a well trained IT workforce.

About Malware

There is a wide range of malware available in today’s cyber world, but Trojan / Agent and Trojan / Invo has gathered IT professionals’ attention through out 2008. According to Sophos Security Threat Report: 2009, Trojan/Agent and Trojan/Invo have dominated the email attachment-based malware popularity in 2008. With Trojan/Agent’s 31% and Trojan/Invo’s 18.1%, they have attain approximately half of today’s email attachment-based malware with the combination of 49.1%.



Malware Characteristic

According to Sunbelt Malware Research Labs, malware can be define by three characteristic:


  1. Malware program installs itself on a user’s computer without the user realizing it being installed.

  2. Malware provides computer users with no easy way for user to uninstall it. Malware posts no listing in the Add/Remove Programs section and often installs a “helper” program to re-downloads and reinstalls the application if malware is removed.

  3. Malware has the ability to track what the user does with the infected computer and do various other malicious activities.

Source: research.sunbelt-software.com

No comments:

Post a Comment