Kimberly Walton
![Kimberly Walton](/assets/img/authors/unknown.jpg)
Kimberly Walton
advised appearing authors common identify information malicious opening rely tactic trick trusted users virus
Authors use e-mail spoofing to trick users into opening malicious e-mail attachments appearing to come from trusted sources. E-mail spoofing is such a common tactic with virus writers. Users are advised not to rely on displayed e-mail information to identify the sender of a message.
combat common connected corporate exist help include malicious methods security system threats users virus writers
Common methods virus writers use to infect users' workstations include malicious exploitation of a system vulnerability and propagation of malicious e-mails or spam. Security technologies exist to help combat these threats for users connected to their corporate IT environment.