Every day an attack on the IM network virus occurs
Users are well aware of the risk of dangerous programs when clicking on a link via e-mail, but limiting this situation in an instant messaging system (IM) is not easy.

"Viruses will not be able to find a way to live in e-mail, but they are migrating to IM more and more," said Francis Costello, technical director of research firm Akonix. in the first quarter of this year, it was about 40, doubling compared to the whole of 2004, but that figure is still only 1/4 of the second quarter with nearly 170 cases ".
IM virus attacks customers using instant messaging services by reviewing a list of friends in certain chat accounts.Next, it sends a message, the content is usually ' Hehe, I just got a great movie :) ', or ' See this picture ' with a connection containing malicious code.
Some hybrid worms can spread simultaneously through both P2P instant messaging and peer-to-peer networks, such as Win32.VB worms and Bropia.August is the month of Kelvir virus.HI with superior language proficiency when it can spread under 10 different language versions.In September alone, Akonix recorded 7 new versions of Mete, Simbag . On average, IM networks are suffering from a daily attack with a rudimentary but effective method.
To protect themselves, users need to install antivirus programs in real time and be alert to any link.
You should read it
- Beware of MSN virus' hi. this is your photo? '
- New virus outbreaks occur via USB
- Rootkit malicious program appears in IM
- What is RCS Messaging on Android? How to use it?
- Can viruses spread through WiFi?
- Add a virus spread through Yahoo! IM
- Tor launched an anonymous chat application on March 31
- The first virus attacked Mac OS X
May be interested
- What is '51% attack'? Can Bitcoin completely collapse by a 51% attack?51% attack makes new transactions unable to confirm network congestion, even if an attacker controls the network completely, it can cause the transaction to be reversed.
- QNAP provides an emergency warning about NAS device attack trends, showing how to secure NAS devicesnas (network attached storage), also known as a network hard drive, is a device that is installed to serve the needs of storing or accessing data.
- What is Volumetric DDoS Attack?volumetric ddos attack is designed to overwhelm internal network capacity with large volumes of malicious traffic. volumetric ddos attack is usually performed against a specific target
- Analysis of an attack (Part 3)in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce
- What is the method of attacking APT network?apt - advanced persistent threat is the term used to describe an attack campaign using the most advanced, high-tech techniques to hit the system's weaknesses implemented by a group of attackers.
- Learn super viruses that are threatening the global industryhighly skilled hackers can use public information about code known as the stuxnet virus to develop attack variants in many industries.
- What is Application Layer Attack?application layer attack - application layer attacks or layer 7 (l7) ddos attacks refer to a type of malicious behavior designed to target the 'top' layer in the osi model where it occurs. common internet requests like http get and http post.
- Cyber-Attack attacked the US military networkafter the us army strategic command issued a ban on the use of mobile communications devices in the us military network last week ...
- Protect your computer from virusesviruses have caused a lot of damage or taken away businesses and government agencies billions of dollars in time as well as expensive in recovering from every virus attack.
- What is Smurf Attack? How to prevent Smurf Attack?smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.