How They Attack
Malware is a category of malicious code that includes viruses, worms, and Trojan horses.
Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.
How Do You Know
Malware works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user
What To Do
Only open email or IM attachments that come from a trusted source and that are expected
Have email attachments scanned by Norton Internet Security prior to opening
Delete all unwanted messages without opening
Do not click on Web links sent by someone you do not know
If a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM session
- Scan all files with an Internet Security solution before transferring them to your system
- Only transfer files from a well known source
- Use Norton Internet Security to block all unsolicited outbound communication
- Keep security patches up to date
Courtesy :- Symantec