Abstract
This paper considers changes in virus technologies and dissemination, and their impact upon anti-virus strategy and mail-management practice. Gateway products handle spoofing viruses inconsistently. The industry’s continued emphasis on reactive detection of known viruses, supplemented by generic drivers and limited heuristics, has been used by virus writers to widen the window of opportunity between virus release and the availability of specific detection. Can the enterprise wait for the industry to adapt, or are broader-based strategies required? In this paper, we review some of the recent developments in virus technology and the responses of anti-virus vendors and service managers, and consider their current and long-term efficacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Harley, David: Email Threats and Vulnerabilities. In: The Handbook of Information Security. Editor: Bidoli, Wiley, 2004 (in preparation).
Harley, David: Macs and Macros: the State of the Macintosh Nation. In: Proceedings of the Seventh International Virus Bulletin Conference, Virus Bulletin Ltd, p.67–98.
Harley, David; Slade, Robert; Gattiker, Urs: Viruses Revealed, Osborne, 2001.
NISSC: Technical Note 03/04. Guidance on Handling Files with Possible Malicious Content. Issued 19 March 2004.
EEMA: „Spam and eMail Abuse Management“. https://www.eema.org/SProjects/spam.asp, 2004.
Skoudis, Ed: Your desktop antivirus product may be leaving you wide open to attack. http://searchsecurity.techtarget.com/tip/0,289483,sidl4_gci967559,00.html, 2004.
Hruska, Jan, 1992. Computer Viruses and Anti-Virus Warfare. Chichester: Ellis Horwood.
Harley, David: Fact, Fiction and Managed Anti-Malware Services — Vendors, Resellers, and Customers Divided by a Common Language. In: Proceedings of the 13th Virus Bulletin International Conference, Virus Bulletin Ltd, 2003, p.83–91.
Burrell, Bruce: The Plague of Viruses That Send Email with Forged „From:“ Fields. http://www.itd.umich.edu/virusbusters/forged_from.html, 2004.
Kotadia, Munir: Zombies may sabotage spam fight. In: ZDNet Week, CNET Networks Inc., 2004, p. 3.
Harley, David: Virus Incident Management at the Gateway. http://www.aavar.org/avar2003/presentations/David_Harley.pdf, 2003.
Hypponnen, Mikko: F-Secure Corporation’s Data Security Summary for 2003: The Year of the worm. http://www.f-secure.com/2003/
Harley, David: The future of malicious code: predictions on blended threats, email exploits, social engineering and more. In: Information Security, 5/5, 2002, p.36–38.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Harley, D. (2004). Massmailers: New Threats Need Novel Anti-Virus Measures. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-322-84984-7_14
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-05910-1
Online ISBN: 978-3-322-84984-7
eBook Packages: Springer Book Archive