Reduce, Reuse, Recycle
For the record, though, “Waledac and Kelihos both send spam, and this is the reason for the confusion,” IT security expert Sorin Mustaca told TechNewsWorld. Both use email to spread but in different ways.
The same group of cybercriminals may have created the code for these worms, because “there aren’t that many cybercriminals who can create a complex piece of software,” Mustaca suggested. “This is just using the old Kelihos [worm] with a new email payload.”
Fixing the Problem
Symantec reiterated well-known practices users can follow to protect themselves: Be suspicious of messages claiming your account has been restricted or needs updating; be wary of links in emails; don’t provide personal information when replying to emails; don’t enter personal information in pop-up pages or windows; and use comprehensive security software.
“This is not Apple’s problem directly,” Mustaca said. “However, they could enforce two-factor authentication and take other steps. Usability drops when you want to make a process more secure, so they need to experiment.”
© Copyright Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity
Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.
Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch