Skip to main content
E-mail Still a Threat even though Attachments are Less Dangerous

Not everyone of us enjoy the “pleasure” of observing the tendencies of hackers, crackers and other bad Internet folks with good computers security skills on a daily basis. It may not be apparent that this is a constantly and rapidly evolving Internet world, with the bad computer folks one step away from the good. Moreover, whether the good guys or bad are out front, shifts from day to day.

Until not long ago, the common way in which Internet viruses and worms were distributed was through contaminated attachments in e-mail. For years, people were told not to click on these attachments unless they trust the source of the email and is expecting that attachment or they have scanned it with an anti-virus software. The message finally began to get through- years later and hackers had a problem.

That’s good news, of course. But crackers are a resilient bunch, and their solution was to send spam with links seeking to get people to contaminated sites, where the real "dirty" work is done. The shift has been startling. One of Sophos's Senior Security Analyst said that;

The number of e-mails containing an infected attachment about 18 months was one in 47. Six months ago, it was one in 337 and it has remained relatively steady. Clearly, the threat has migrated from e-mail to the Web, but they still use e-mail as an initial means of contact. They’ve partnered with malware writers — spam guys — and have honed their craft.

It is true that cause and effect are hard to precisely gauge. The rise of Web 2.0 — the highly interactive and collaborative new phase of the Internet — plays a big role in this new mess. The nature of Web 2.0 makes it far easier for crackers to embed malicious code in the nooks and crannies of Web sites. This code sits there until unsuspecting Web users — both those brought by the spam and those lucky enough to show up on their own — stop by and get infected. Indeed, in many cases, just visiting the site without even clicking on anything is enough to get infected.

Due to this, I feel that a new approach is needed for sharing documents via email and on Internet. There are already ways for large enterprises to share documents via a centralized repository but what about the public users whom uses Hotmail, Yahoo! and Gmail service?

Recently, I came across file-sending service YousendIt.com whom also provides plug-ins for MS Outlook 2003 and many other applications which allows you to send attachments via a hyperlink within the body of your email. With a click on the hyperlink within your email, your email recipient can download these attachments easily.

After my first use, I exclaimed, "Hey! This is a great solution! You can send emails which are not more than 10KB in size and the attachments are just hyperlinks in your email body which your email recipients can downloaded from a centralized repository up to 2GB per file".

This could be the best, fastest and safest solution for digital content delivery for now. With Yousendit.com's innovative platform which empowers people to send, receive and track digital files on-demand, it will take a while for hackers and crackers to exploit this digital content delivery service to send spam with potential malicious software.

Till then, with YouSendIt’s reliable service, providing a convenient email attachment solution, an easy-to-use FTP replacement, and eliminates the need to send files on disk with an overnight courier service as you can send attachments as large as 100MB for the free account up to 2GB for the Corporate Suite account with a good Privacy Policy and DMCA governance, this could be the solution that we have all been looking for.



Comments

Popular posts from this blog

Strategic Plan vs. Operational Plan

Strategic Plan Vs. Operational Plan: Do You Know the  5 Main Differences ? What's the difference between a Strategic Plan vs. an Operational Plan? Both are plans but are they the same? If not, what’s the difference? Do you need both? Why do we need both?  After mentoring Start-Ups from pre-revenue to achieving at least S$1M in revenues since 2012 and supporting growing Small-Medium Enterprises within the S$4M to S$10M range revenues, whose leadership teams are stuck in their day to day operational matters and fire-fighting, I hear these questions frequently.  My response: A  strategic plan  outlines your Vision, Mission, Core Values to build the Culture with high-level goals for the next 3 to 5 years. It also takes into account how you’ll measure those goals, and the major projects you’ll take on to meet them. An  operational plan  (also known as a  work plan ) is an outline of what each of your business d...
Why Data Backups Are So Important Our computers, smartphones, personal digital assistants, MP3 players, operating systems, and software are tools that we use to create and manipulate the content that is the most important aspect of computing - our data. Without your personalized data, the computing experience will be mundane and very generic. We need to be able to create in order to really feel good about what we’re doing. Many times people don’t realize how important their data is until it’s too late. I have see customers whom says, why do I need to spend $3,000 on a tape backup system just to archive, copy another instance of my data and then keep it? I’ve seen way too many people treat their hard drive’s like an all-you-can-eat buffet, and they’ll just pile anything and everything that they can find into an endless collection of files and folders that will be very difficult to make sense of in the future. The whole point of technology should be to simplify our lives instead of comp...

From Toilet Cleaner to CEO

On 22-April-2012, my entrepreneurship journey story was published by The Sunday Times in Singapore by Mr. Wong Kim Hoh