Skip to main content

Massmailers: New Threats Need Novel Anti-Virus Measures

  • Chapter
  • 99 Accesses

Abstract

This paper considers changes in virus technologies and dissemination, and their impact upon anti-virus strategy and mail-management practice. Gateway products handle spoofing viruses inconsistently. The industry’s continued emphasis on reactive detection of known viruses, supplemented by generic drivers and limited heuristics, has been used by virus writers to widen the window of opportunity between virus release and the availability of specific detection. Can the enterprise wait for the industry to adapt, or are broader-based strategies required? In this paper, we review some of the recent developments in virus technology and the responses of anti-virus vendors and service managers, and consider their current and long-term efficacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harley, David: Email Threats and Vulnerabilities. In: The Handbook of Information Security. Editor: Bidoli, Wiley, 2004 (in preparation).

    Google Scholar 

  2. Harley, David: Macs and Macros: the State of the Macintosh Nation. In: Proceedings of the Seventh International Virus Bulletin Conference, Virus Bulletin Ltd, p.67–98.

    Google Scholar 

  3. Harley, David; Slade, Robert; Gattiker, Urs: Viruses Revealed, Osborne, 2001.

    Google Scholar 

  4. NISSC: Technical Note 03/04. Guidance on Handling Files with Possible Malicious Content. Issued 19 March 2004.

    Google Scholar 

  5. EEMA: „Spam and eMail Abuse Management“. https://www.eema.org/SProjects/spam.asp, 2004.

    Google Scholar 

  6. Skoudis, Ed: Your desktop antivirus product may be leaving you wide open to attack. http://searchsecurity.techtarget.com/tip/0,289483,sidl4_gci967559,00.html, 2004.

  7. Hruska, Jan, 1992. Computer Viruses and Anti-Virus Warfare. Chichester: Ellis Horwood.

    Google Scholar 

  8. Harley, David: Fact, Fiction and Managed Anti-Malware Services — Vendors, Resellers, and Customers Divided by a Common Language. In: Proceedings of the 13th Virus Bulletin International Conference, Virus Bulletin Ltd, 2003, p.83–91.

    Google Scholar 

  9. Burrell, Bruce: The Plague of Viruses That Send Email with Forged „From:“ Fields. http://www.itd.umich.edu/virusbusters/forged_from.html, 2004.

  10. Kotadia, Munir: Zombies may sabotage spam fight. In: ZDNet Week, CNET Networks Inc., 2004, p. 3.

    Google Scholar 

  11. Harley, David: Virus Incident Management at the Gateway. http://www.aavar.org/avar2003/presentations/David_Harley.pdf, 2003.

  12. Hypponnen, Mikko: F-Secure Corporation’s Data Security Summary for 2003: The Year of the worm. http://www.f-secure.com/2003/

  13. Harley, David: The future of malicious code: predictions on blended threats, email exploits, social engineering and more. In: Information Security, 5/5, 2002, p.36–38.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Harley, D. (2004). Massmailers: New Threats Need Novel Anti-Virus Measures. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84984-7_14

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05910-1

  • Online ISBN: 978-3-322-84984-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics