Podcast: Fact or fiction -- Am I a bot or not?

Learn how to tighten email security policies, educate users about the dangers of seemingly harmless messages, and eliminate email accounts that have been taken over by bots.

In the last year, botnets have exploded onto the security scene and gone from tools used by script kiddies to sophisticated networks constructed by professional hackers—using your company's machines. The most common infection method for bots is via a malicious email, often containing a link to a website where a Trojan installs silently on the victim's PC.

A new report shows that 26% of all of the malicious code analyzed in 2007 were Trojans. Identifying these malicious messages can be a challenge, and this podcast will provide listeners with valuable techniques for tightening security policies on incoming email; educating users about the dangers of seemingly harmless messages; and finding and eliminating email accounts that have been taken over by bots.

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Fact or fiction: Am I a bot or not?
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As
This was last published in June 2008

Dig Deeper on Emerging Information Security Threats

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close