Protecting Yourself from IM Attacks

If you or your network needs IM services, here are the steps you can take to minimize the risk from malicious hackers:

  1. Don’t accept files from untrusted sources.

    No matter what you are doing, don’t accept files or scripts from untrusted sources. Don’t run programs or load scripts from untrusted sites that claim to boost IM performance or help with defense. Oftentimes there are Trojan files that will compromise your machine. Make sure all file security and warning mechanisms are enabled on IM clients and set to their highest setting.

  2. Use an antivirus scanner.

    A good antivirus scanner, that scans Internet file downloads will catch most known malicious mobile code, including IRC worms and other malicious IM programs.

  3. Run the latest versions of IM clients.

    Every new version of an IM client tries to fix exploits used by hackers to exploit security holes. By utilizing the latest version of the IM client, you not only get new functionality, but less exposure to malicious mobile code.

  4. Hide your IP address.

    If allowed in your client software, disable the publication of your IP address. This will decrease the opportunities for malicious hackers to exploit your machine.

  5. Change default directories.

    Many IM exploits are hard coded to work by looking for the default install and download directories of your IM client program. Simply install to a slightly different directory and you’ve taken a significant step against malicious IM code. For example, you might change ...

Get Malicious Mobile Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.