Skip to main content

Posts

Showing posts from June, 2010

Biggest Three Instant Messengers Of The World.

Depending on who you ask, the biggest 3 instant messengers are going to be different. For each PC user who uses an IM there is another one who will use something different, and enjoy it more, declare that it works better and is more secure.

The top notch and most often used messenger will of course be the MSN messenger which ships with Windows operating systems. While this version of the instant messenger service is not necessarily the best, it is the most widely used version of any instant messenger simply, we believe, because it is included with new versions of Windows operating systems.

Secondary to MSN messenger is Skype, the messenger which also permits telephone calls and offers discounted rates to callers in multiple countries. Many people are in actuality not aware that Skype permits instant messaging, but do use the service for telephone calls, which does add them to the count of total users.

Although AOL Instant Messenger, or AIM as it is called now, was once the largest as wel…

About Instant Messaging Security

Controlling IM Security Risks

IM usage in business – whether sanctioned or not - is growing rapidly. IM and other real-time communications are network-enabled applications that often operate outside the control of the corporate IT department. While they offer business value, these not-so-secure channels are increasingly becoming the vectors of propagation for malicious applications and code leaving IT to address how to enable business productivity from IM while also controlling risk.

IM security risk falls into three main categories:

* Inbound threats
IM creates new vectors for the distribution of malware (viruses, worms, spyware, rootkits, and more) and SpIM (Spam over IM) which can cause a major drain on productivity and resources. Read about security incidents involving the use of chat, IM and P2P networks and learn more about malware and spyware prevention.
* Outbound threats
IM opens new 'holes' through which information can leak or be leaked, leading to use…