Skip to main content

Basic rules for secure IM communication.

As time progresses, cybercriminals are refining their techniques to lure potential victims to visit malicious hyperlinks. Instant messaging is a very effective way for malware to stay active and thrive.

Last week, an unnamed computer worm forced Microsoft to temporarily suspend active links in its Live Messenger 2009 to prevent the aggressive instant messaging (IM) worm spreading.

Mak James, technical manager at ESET UK comments, “This is quite a surprising measure, because worms spreading through Instant Messaging (IM) such as Skype, Yahoo! Messenger and Microsoft Live Messenger are not new at all. For example, the AimVen worm was discovered in 2003 and was targeting the America Online Instant Messenger platform,”

James continues, “The modus operandi for this type of attack is simple. First the victim receives a message that contains a hyperlink from one of their contacts, clicks on it and gets infected. The worm can also use geo-localisation in order to use the victim's language and even relate to news or events trending in the victim's country. These advanced techniques may trick even the most cautious users.

ESET has compiled seven golden security rules while instant messaging:

1. Opening pictures, downloading files or clicking links should be avoided at all cost in case it comes from someone you do not know. Do not open suspicious files or links even if they come for someone you know; try to confirm with the person on the origin of the attachment.

2. Do not reply to messages from people you don’t know if you were not expecting them. If someone you do not recognise sends you a request to add him/her to your contacts, decline the request if not sure about the identity of the contact.

3. Unwanted messages ought to be blocked - blocking spam or messages from strangers might be easier than you think – most IM software allows you to create your own contact list.

4. Do not post sensitive information and private data in instant messages, especially refrain from sharing credit card numbers, banking details, paswords or important personal identification data like phone number or addresses. You should also avoid sharing information about your IM name or e-mail contact over the Intertnet.

5. Your Instant Messaging should also have as strong a password as any other account. Always use different passwords for different accounts and other online services (such as online banking, e-mail). Do not recycle your password. If you log in on public or shared computer, make sure to uncheck the automatic login feature.

6. Avoid meeting strangers that you have met online while instant messaging. If you decide to meet someone in real person anyway, take safety precautions – bring someone along with you.

7. Turn off your Web camera if you are not using it, as some malware allows criminals and strangers to spy on you through your own webcam. If you have an integrated camera, always check the control light that it is off when you are not using it.

Source: http://www.itsecurityportal.com

Comments

Popular posts from this blog

Want To Get Answering Machine For Your IM?

Computer's personal often face problems when they have to take a break from their PC for some time and can’t answer to emails and instant messages. Actually, for email you can set up an autoresponder if you use Outlook software, and there’s a way out for gmail, too. But what can you do with your instant messenger? I have a lot of IM accounts for any purposes with different people in each account. So what utility can tell these people that I am out on a vacation or down with fever? Answer.im comes to the rescue by setting up an automated web based answering machine for your instant messenger. It works with MSN, ICQ, AIM, Yahoo and Google Talk as of now. How it Works Setting it up is very simple. First, hop over to http://answer.im/. Then, select your IM network (like GTalk, Yahoo, etc). Fill in your username and password and hit Login. Features Now, you can customize your automated reply and select the status you would like your account to remain at. Since the service is web based, ...

Durov: The phone of the richest man in the world was hacked through WhatsApp.

The founder of "VKontakte" and Telegram Pavel Durov said that back in November 2019 he warned about the vulnerability of the WhatsApp application, through which hackers hacked the smartphone of the richest man on the planet Jeff Bezos. Durov wrote about it in his Telegram-channel. Earlier, the company Facebook, which owns WhatsApp, noted that the businessman's mobile phone was hacked because of vulnerabilities in the operating system from Apple. At the same time, Durov is convinced that the problem is not iOS. " WhatsApp in its marketing campaign uses the words 'end-to-end encryption' as a magic spell, which itself should ensure the security of all communications. But this technology alone cannot guarantee absolute confidentiality," says the founder of Telegram. One of the drawbacks of end-to-end encryption, he says, is that backups of transmitted data are often not encrypted. In addition, says Durov, each application has "ways around...

LAN Messenger Is LAN IM Communication Tool

LAN Messenger, a instant LAN messaging software for home or office users, can be very useful for your work, One LAN instant messenger enables you to communicate with other users connected across the same LAN, allows you to chat with one or more users, or to send an alert message that will show as a small pop-up window on the users desktop. some Land messenger includes many features like auto-reply text, file transfers, multi-user chat, online status, alert messages to all users and more. This article will help you find one land messenger for your business. These freeware or sharewares combine ease-of-use, power and flexibility. Bopup Messenger, it is from blabsoft, this instant messenger enables you to communicate with other users connected across the same LAN. It is compatible with standard messengers like WinPopup and Net Send. It has extended message support, scans users and computers on a local network, and supports 10 languages. It includes an ignore list, file transfer, message l...