This Content Component encountered an error

Messaging Security School

Counterintelligence strategies for thwarting email threats <<previous|next>> :Quiz: Counterintelligence strategies for thwarting email threats

Podcast:

Podcast: Fact or fiction -- Am I a bot or not?

SearchSecurity.com

In the last year, botnets have exploded onto the security scene and gone from tools used by script kiddies to sophisticated networks constructed by professional hackers—using your company's machines. The most common infection method for bots is via a malicious email, often containing a link to a website where a Trojan installs silently on the victim's PC.

A new report shows that 26% of all of the malicious code analyzed in 2007 were Trojans. Identifying these malicious messages can be a challenge, and this podcast will provide listeners with valuable techniques for tightening security policies on incoming email; educating users about the dangers of seemingly harmless messages; and finding and eliminating email accounts that have been taken over by bots.

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Fact or fiction: Am I a bot or not?
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As

12 Jun 2008