Podcast: Fact or fiction -- Am I a bot or not?

Learn how to tighten email security policies, educate users about the dangers of seemingly harmless messages, and eliminate email accounts that have been taken over by bots.

In the last year, botnets have exploded onto the security scene and gone from tools used by script kiddies to sophisticated networks constructed by professional hackers—using your company's machines. The most common infection method for bots is via a malicious email, often containing a link to a website where a Trojan installs silently on the victim's PC.

A new report shows that 26% of all of the malicious code analyzed in 2007 were Trojans. Identifying these malicious messages can be a challenge, and this podcast will provide listeners with valuable techniques for tightening security policies on incoming email; educating users about the dangers of seemingly harmless messages; and finding and eliminating email accounts that have been taken over by bots.

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Fact or fiction: Am I a bot or not?
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As
This was first published in June 2008

Dig deeper on Emerging Information Security Threats

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close