PRINT THIS PAGE
 

Malware

How They Attack

Malware Malware is a category of malicious code that includes viruses, worms, and Trojan horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.

How Do You Know

  • Malware works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user

What To Do

  • Only open email or IM attachments that come from a trusted source and that are expected
  • Have email attachments scanned by Norton Internet Security prior to opening
  • Delete all unwanted messages without opening
  • Do not click on Web links sent by someone you do not know
  • If a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM session
  • Scan all files with an Internet Security solution before transferring them to your system
  • Only transfer files from a well known source
  • Use Norton Internet Security to block all unsolicited outbound communication
  • Keep security patches up to date

Search by name

Example: W32.Beagle.AG@mm