In today’s fast-moving business environment, Instant Messaging offers a number of advantages, such as sending e-mails, transfer file etc. Because IM uses Peer-to-Peer technology to enable direct communication, it can allow hackers to bypass firewalls and access IT systems and has the potential to threaten your entire network with a whole raft of security attacks.
A key concern with IM is the lack of encryption for data sent across the network, allowing attackers to view sensitive information. Instant Messaging, usually based on HTTP protocol, creates issues for server-based anti-virus systems, which do not monitor IM traffic. This could allow worms to propagate inside the network.
What can you do about IM?
Read the recommendation of IT Obverser on what you should do about IM in http://www.it-observer.com/articles.php?id=731
Popular Japanese Web site hard hit by major hack
Kakaku.com, Japan's largest price comparison engine, announced that Trojan horse programs were installed on the company's servers during a May 11, 2005 attack. Kakaku.com elected to continue running its website until May 14 in an effort to trace the attack, according to company president Yoshiteru Akita. The programs, trojandownloader.small.AAO and PSW.Delf.FZ, affect computers running Windows operating systems and include key-logging and remote control capabilities. The company expects its website to be back up and running no earlier than May 23.