Akonix: 22 IM Attacks This Month
Company predicts upcoming spike in malicious activity as companies prepare unified communications rollouts
SAN DIEGO -- Akonix Systems, Inc., a provider of policy and risk management products for real-time communications, today announced its IM Security Center researchers tracked 22 malicious code attacks over instant messaging (IM) networks and a 50% increase in threats on P2P networks during the month of October. Although the number of monthly IM threats decreased from September, Akonix forecasts this is the calm before the storm as businesses implement unified communications (UC) platforms in 2008.
New IM worms identified include AttachMsngr, Botsie, Destructor, Orcu, QQDragon, Weapbot and Yahack. Sdbot was the most common with three variants, followed by Destructor and Yahack with one each. In addition, attacks on P2P networks, such as Kazaa and eDonkey, increased 50% this month over last, with 24 attacks.
During October, Akonix security analysts issued three new policy updates to protect customers against new malware, using the industry's only dynamic IM malware, spim and protocol update system. Akonix Security Update Services automatically push updates to customers to block spyware, worms and viruses. Akonix customers were secure on day zero from each new threat with the in-depth protection and containment features of Akonix's 360° Security for Real-Time Communications(tm).
"Despite this month's slowdown, the ongoing implementation of UC will introduce new corporate vulnerabilities and liabilities, including the number of entry points for hackers to attack," said Don Montgomery, VP of marketing at Akonix. "As companies continue to multiply the number of real-time applications deployed, they need to protect themselves from new threat vectors. IM will be a key point of contention, as Akonix anticipates it will become the foundation for electronic messaging on corporate desktops."
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024