Latest (all topics)
Top stories
Daily round-up
Web site of the day
Gadget of the day
Video of the day
Innovations
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
BIOS Podcast #11: Instant Messaging Threats
 
Companies of all sizes depend on Instant Messaging (IM) to instantly connect with employees, partners and customers around the globe. Home users also use the technology to keep in touch with friends and family.

However, IM-borne security threats have increased dramatically in volume since last year. According to various reports the quantity of IM threats increased 250 per cent in the first quarter of 2005, compared with the same period last year. Threats come in the form of viruses, worms, spam and phishing attacks sent over public IM networks.

Perhaps more alarming is that some 50 per cent of the incidents reported last year involved attacks at workplaces where freely available IM software such as AOL Instant Messenger, MSN Messenger, Windows Messenger, and Yahoo Messenger is used.

Also concerning is that more than 75 new threats on public IM and peer-to-peer computing networks were discovered in the first three months of last year. And over 82 per cent of the incidents reported involved IM virus or worm propagation, while 14 per cent dealt with IM file transfer hijacking. Only around 11 per cent of the incidents involved attacks on known vulnerabilities on IM applications.

Based on this data, your company should take a closer look at managing IM security issues. Vincent Weafer from Symantec Security Response examines how the rising use of Instant Messaging in the workplace impacts Internet security.

To listen to the full Podcast [8:02 - 7.5MB MP3 file], please click here. For more Podcasts, go to biosmagazine.co.uk/podcasts. Enjoy!




 
BIOS, Mar 28, 06 | Print | Send | Comments (0) | Posted In Security
Related Articles

Defending In Depth
Cyber Security & Other Games
Second Life, Second Identity?
Don't Choke In The Name Of Security
A Baker's Dozen Of Security Bytes
Patching Up Security
Webroot Software Spy Sweeper 5.3
PC Tools Spyware Doctor 4.0
How Cybercrime Operations Work
ZoneLabs ZoneAlarm Internet Security Suite 7

More...
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators