An analysis of malware attached in spam

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Spam is usually used to propagate malware. Most spam leads to click the links or attached files by disguising it with social issues, entertainers, events, Christmas or New Year greetings, and friends using social engineering techniques. As a user clicks it, the user's system is infected with malware. The infected systems can be used to various cyber-crimes. Recently such spam has been increased and that includes executable malware. In this paper, the results of the analysis of the malware attached in spam are presented.

Cite

CITATION STYLE

APA

Im, E. G., & Han, K. S. (2012). An analysis of malware attached in spam. In Lecture Notes in Electrical Engineering (Vol. 120 LNEE, pp. 601–605). https://doi.org/10.1007/978-94-007-2911-7_58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free