VBS attachment vulnerability test |
Why is this type of content
dangerous? Which viruses made use of this
method? Read more about LoveLetter virus: http://www.gfi.com/news/press.asp?release=newvirus&lcode= How can I protect against this with GFI
MailSecurity? Will a worm making use of this method run
automatically? How does it work exactly? |
MIME header vulnerability test (Nimda testing) |
Why is this type of content
dangerous? Which viruses made use of this
method? For more information on Nimda check out: http://www.gfi.com/news/press.asp?release=nimdaworm&lcode=en How can I protect against this in GFI
MailSecurity? Will a worm that uses this method run
automatically? How does it work exactly? |
ActiveX vulnerability test (works only on IE5.x) |
Why is this type of content
dangerous? Which viruses made use of this
method? For more information about VBS.Loading: http://securityresponse.symantec.com/avcenter/venc/data/vbs.loding.a@mm.html This example does not require the user to follow a link, but rather relies on the IFrame tag to automatically spawn an instance of Internet Explorer internally and access a web page, which in real life situations could be infectious. How can I protect against this in GFI
MailSecurity? Will a worm making use of this method run
automatically? How does it work exactly? I get an error when trying out this test. Why is
that? My anti-virus program tells me I'm infected with a
virus. Why? |
GFI's Access exploit vulnerability test |
Why is this type of content
dangerous? Which viruses made use of this
method? How can I protect against this with GFI MailSecurity?
Will a worm making use of this method run
automatically? How does it work exactly? |
Object Codebase exploit |
Why is this type of content dangerous? Which viruses made use of this method? How can I protect against this with GFI
MailSecurity? Will a worm making use of this method run
automatically? How does it work exactly? |
IFrame remote file download |
Why is this type of content dangerous? Which viruses made use of this
method? How can I protect against this using GFI
MailSecurity? Will a worm making use of this method run
automatically? How does it work exactly? |