Kimberly Walton

Kimberly Walton
advised appearing authors common identify information malicious opening rely tactic trick trusted users virus
Authors use e-mail spoofing to trick users into opening malicious e-mail attachments appearing to come from trusted sources. E-mail spoofing is such a common tactic with virus writers. Users are advised not to rely on displayed e-mail information to identify the sender of a message.
combat common connected corporate exist help include malicious methods security system threats users virus writers
Common methods virus writers use to infect users' workstations include malicious exploitation of a system vulnerability and propagation of malicious e-mails or spam. Security technologies exist to help combat these threats for users connected to their corporate IT environment.
connecting corporate environment infected network spread users virus
Users with infected workstations connecting to their corporate IT network can spread the virus to the corporate environment.
allow connect engineers malicious messages misleading obtain running send social trick users web
To do this, social engineers sometimes send misleading messages to try to trick users into running a malicious attachment. Or they will try to get users to connect to a spoofed Web site. This could allow the perpetrator to obtain confidential information.