Email Alerts
-
Quiz: Secure instant messaging
A five-question multiple choice quiz to test your understanding of the content presented in the Secure instant messaging lesson of SearchSecurity.com's Messaging Security School. Messaging Security School
-
Secure messaging complications result in limited protection
The market is hindered by multiple standards and deployment options, analyst says. Article | 27 May 2008
-
Messaging techniques spawn new security policies
Gartner IT Security Summit: As people use a growing variety of messaging programs in the workplace, companies are being forced to create new policies to minimize crossover threats. Article | 17 Jan 2008
-
New AIM Trojan steals financial data
A new variant of Download.ject is threatening AIM users, opening backdoors and stealing financial data. Article | 17 Jan 2008
-
AOL closes AIM attack vector, but risks remain
AOL Instant Messenger (AIM) 6.5 closes a recently reported attack vector, but one researcher warns that AOL has yet to address the core problem. Article | 16 Oct 2007
-
Researcher says AIM still vulnerable, AOL insists it's fixed
Contrary to previous reports, AOL Instant Messenger is still open to attack, a researcher claims. But AOL says it addressed the researcher's finds with a more permanent fix. Article | 27 Sep 2007
-
Serious security flaw in AOL Instant Messenger
Researchers at Core Security say attackers could run malware on targeted computers by exploiting a flaw in the widely-used AOL Instant Messenger (AIM) application. Article | 26 Sep 2007
-
Security flaws found in AOL, Yahoo IM programs
Attackers could exploit security flaws in popular instant messaging programs from AOL and Yahoo to upload malicious files on targeted computers. Article | 20 Sep 2007
-
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia. Article | 29 Aug 2007
-
AOL, Yahoo, Trillian IM applications under threat
Vulnerability researchers say attackers could exploit flaws in AOL Instant Messenger, Trillian and Yahoo Messenger to run malicious code or cause a denial of service. Article | 17 Jul 2007
-
Security vendor Postini acquired by Google
Search engine giant Google says it will use its acquisition of security and compliance vendor Postini to expand its hosted applications for businesses. Article | 09 Jul 2007
- See more News on IM Security Issues, Risks and Tools
-
How to lock down instant messaging in the enterprise
The popularity of instant messaging programs in the enterprise creates a huge problem for companies concerned about data leakage and Web-based malware. In this tip, application security expert Michael Cobb offers several strategies enterprises can us... Tip
-
Unified communications infrastructure threats and defense strategies
Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to de... Tip
-
Latest IM attacks still rely on social engineering
In the age of email-borne superworms, email recipients would often become victims without any interaction or warning. However, as Michael Cobb explains, many of today's most dangerous instant messaging attacks require user interaction, meaning wary, ... Tip
-
Secure instant messaging in the enterprise
Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly ... Tip
-
Websense Enterprise 5.5
Learn why Information Security magazine believes this product is ideal for organizations who need an robust Internet filtering solution. Tip
-
How to block IM applications in the enterprise
In this tip, security guru Mike Chapple discusses how IM threatens the network and provides strategies you can use to keep your network free of IM traffic. Tip
-
How to reduce spim
Learn three tips for reducing unsolicited instant messages. Tip
-
Akonix L7 Enterprise brings IM under control
How Akonix L7 Enterprise 4.0 secures instant messaging applications. Tip
-
Tips for securing Web-based applications
The immense popularity of Web-based applications, such as MP3 files and IM, is posing more than productivity problems for enterprises. They also make excellent attack vectors. Tip
-
Are P2P applications worth the risk?
There are inherent security dangers in P2P applications. Kevin Beaver helps you determine if they're worth the risk. Tip
- See more Tips on IM Security Issues, Risks and Tools
-
What are effective ways to stop instant messaging (IM) spam?
In this expert Q&A, Michael Cobb reveals what techniques and tools can be used to stop instant messaing spam, or spim, in the enterprise. Ask the Expert
-
Is it possible to ban chat programs on an enterprise LAN?
Chat programs can undermine enterprise security, but what's the best way to get rid of them? Application security expert Michael Cobb gives his suggestions. Ask the Expert
-
Can DHCP be used to selectively block instant messaging clients?
Restricting instant messaging use has been a significant security challenge for organizations, but will DHCP help solidfy an IM policy? In this SearchSecurity.com Q&A, Michael Cobb explains which access control mechanisms are the most effective. Ask the Expert
-
Should a rise in text message spam be expected?
According to a Ferris Research study, consumers this year are expected to receive a total of about 1 billion cell phone spam messages. Yet, compared to other countries, text message spam hasn't hit the United States very hard. In this SearchSecurity.... Ask the Expert
-
How to selectively block instant messages
Monitoring instant messaging traffic isn't easy, especially when constantly evolving IM applications are designed to exploit firewall vulnerabilities. SearchSecurity.com's application security expert Michael Cobb reviews the best methods for taking o... Ask the Expert
-
How VPNs interact with instant-messaging applications
In this Ask the Expert, application security expert Michael Cobb reviews how an enterprise-wide VPN works and whether it encyrpts and protect instant-messaging communications. Ask the Expert
-
P2P availability, confidentiality and authentication vulnerabilities
Learn tactics you can employ to reduce common P2P vulnerabilities. Ask the Expert
-
How to block an unwanted IM
Application security expert Michael Cobb provides step-by-step procedures designed to show you how to block unwanted instant messages. Ask the Expert
-
The security implications of using IM through a dedicated port
Ask the Expert
-
IM policy template
Ask the Expert
- See more Expert Advice on IM Security Issues, Risks and Tools
-
greynet (or graynet)
Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department. Definition
-
Podcast: Top 5 quick tips for safer instant messaging
Michael Cobb of Cobweb Applications counts down five quick tips that can secure IM in the enterprise. Cobb discusses account naming rules, acceptable use policy, instant messaging encryption and much more. Podcast
-
What are effective ways to stop instant messaging (IM) spam?
In this expert Q&A, Michael Cobb reveals what techniques and tools can be used to stop instant messaing spam, or spim, in the enterprise. Ask the Expert
-
Secure messaging complications result in limited protection
The market is hindered by multiple standards and deployment options, analyst says. Article
-
Is it possible to ban chat programs on an enterprise LAN?
Chat programs can undermine enterprise security, but what's the best way to get rid of them? Application security expert Michael Cobb gives his suggestions. Ask the Expert
-
How to lock down instant messaging in the enterprise
The popularity of instant messaging programs in the enterprise creates a huge problem for companies concerned about data leakage and Web-based malware. In this tip, application security expert Michael Cobb offers several strategies enterprises can us... Tip
-
Messaging techniques spawn new security policies
Gartner IT Security Summit: As people use a growing variety of messaging programs in the workplace, companies are being forced to create new policies to minimize crossover threats. Article
-
New AIM Trojan steals financial data
A new variant of Download.ject is threatening AIM users, opening backdoors and stealing financial data. Article
-
AOL closes AIM attack vector, but risks remain
AOL Instant Messenger (AIM) 6.5 closes a recently reported attack vector, but one researcher warns that AOL has yet to address the core problem. Article
-
Researcher says AIM still vulnerable, AOL insists it's fixed
Contrary to previous reports, AOL Instant Messenger is still open to attack, a researcher claims. But AOL says it addressed the researcher's finds with a more permanent fix. Article
-
Serious security flaw in AOL Instant Messenger
Researchers at Core Security say attackers could run malware on targeted computers by exploiting a flaw in the widely-used AOL Instant Messenger (AIM) application. Article
-
Security flaws found in AOL, Yahoo IM programs
Attackers could exploit security flaws in popular instant messaging programs from AOL and Yahoo to upload malicious files on targeted computers. Article
- See more All on IM Security Issues, Risks and Tools
About IM Security Issues, Risks and Tools
Visit our new Social media security and real-time communication security resource center for more information!
Get tips and tricks on how to secure instant messaging (IM) in the enterprise and prevent IM attacks, IM, Trojans, worms and spam.
Security Management Strategies for the CIO