How to Prepare for the Ever-Changing Evolution of Malware

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next How to Prepare for the Ever-Changing Evolution of Malware-5 Next

Suspicious Attachments

Do not open attachments from unknown people or attachments that appear suspicious. This is a very, very common method for attackers to use - delivering malware straight to your inbox, which is both convenient and highly effective. Do not click on an unsolicited link or open an attachment unless you know it is reputable.

Only six years after the first personal computer was introduced in 1975, the world was introduced to the very first computer virus: Elk Cloner. It was written to infect the Apple LLC's operating system, known then as Apple DOS 3.3. Once the virus was triggered, it displayed a poem explaining how Elk Cloner was copying itself all through the victim's machine and that it may be no easy task to reverse its effects.

It did not take long, however, for people to start pushing the limits past simple pranks and start making malicious software designed as actual attacks against their victims. In the early 1990s, for example, malware authors were learning the art of evasion. They understood that they could now benefit from hiding malware inside documents instead of just supplying their victims with more obvious standalone executables. By the mid-2000s, more than a million known computer worms were circulating around the Internet. Email spam was also becoming big business as malware authors stood to make serious cash by blasting out unsolicited email, "spam," and getting just a percentage of users to buy their goods or click on links. And by 2010, Stuxnet was introduced to the masses followed by spin-offs that included Duqu, Flame and the Regin Trojan. The point is that malware has evolved from attacking individual users to gaining entry to tens of thousands of people's banking information.

While technology and personal habits mature with each new cyber attack, the threats lurking around the corner do the same at a seemingly uneven pace. Because we can't predict exactly what's ahead, Fred Touchette, senior security analyst at AppRiver, has identified tips and best practices to prepare for ever-changing and always evolving malware threats. 


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.