What e-mail hackers know that you don’t

What e-mail hackers know that you don?t is a free (registration required) white paper, provided by Secure Computing. The document outlines how hackers are exploiting vulnerabilities in e-mail systems, and describes the widely available hacking tools they use.

Table of contents

  • Abstract
  • Introduction
  • E-mail security challenges
  • Vulnerabilities of e-mail systems
  • How hackers attack
  • Self-propagation: the new mission of attacks
  • Typical hacking scenario
  • The hacker?s toolkit
  • Protect your enterprise

E-mail systems such as Microsoft Exchange, Lotus Notes and GroupWise were constructed with a single purpose in mind: accept and send the maximum amount of mail, and route that mail as efficiently as possible. Without question this has succeeded; e-mail is the most commonly utilized business communication tool on the planet, and its use is projected to continue to rise. In fact, the current volume of e-mail sent worldwide is now more than 50 billion messages per day, with that number expected to double by 2008.

E-mail?s continually burgeoning popularity makes it an increasingly attractive target for individuals seeking to do harm, either for their own misguided personal satisfaction, or more likely, for financial gain. The first e-mail hackers found simple vulnerabilities in the operating systems and protocol stacks of e-mail systems, and exploited these known weaknesses. Now, however, hackers and virus writers have become specialists, constantly developing new and innovative methods of overcoming the improvements made in today?s security systems. The game of cat-and-mouse is unlikely to end any time soon, if ever. With every improvement in defensive techniques, hackers and virus writers modify their tactics in an attempt to circumvent these defenses and wreak havoc on corporate networks.

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top