Answer the question
In order to leave comments, you need to log in
Answer the question
In order to leave comments, you need to log in
Attackers are on the alert, and email attachments are still a way to infiltrate closed networks. Do not forget about encoders)
You need to protect against viruses / trojans, even at the mail gateway, locally on the machine and it would be nice to prohibit the launch of individual extensions with a policy)
What they just didn’t send me, from Java scripts to full-fledged encryptors that tightly encrypt EVERYTHING they get to, including open balls. Virus programs are no longer sent, but here are hidden scripts hidden under zip - please.
This is both, and the third, and one hundred and fifty-eighth. There is only one rule regarding email attachments and you need to know it as "Our Father" - attachments that you did not expect to see - do not open! Investments in respect of which there is even the slightest doubt - do not open! The oldest but still the most working way to make the user run the file :D
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question