|
Be Aware of the Risks of File-Sharing.
Why bother doing this? If you use file-swapping
services, you will probably get
more than you bargained for...
Use caution when participating in
Peer-to-Peer
(P2P) file-sharing networks
In 2003, 7 of the 9 most popular P2P tools,
downloaded by more than 320 million users,
came with spyware or adware.
Spyware often remains active even when the
original file- or music-sharing software is
un-installed, requiring extra steps to ensure
that your computer is not continuing to leak
your confidential information.
Proper configuration of file sharing
settings can be difficult: you may
end up sharing access to all files on your
computer in addition to or instead of the
"media" files you thought your were sharing.
FTC/GAO reports indicate that P2P
networks are frequently used to exchange
business-inappropriate content such as
pornography.
KaZaA is listed by
Computer Associates' Spyware Information Center
as one of the worst Spyware threats (eWeek
article, 26 Nov 2004), and
Grokster is the most rapidly spreading spyware
in July 2005.
Even BitTorrent is not immune to exploits by
makers of adware and spyware (eWeek
article, 15 Jun 2005; see also security
researcher Chris Boyd's
VitalSecurity.org nonprofit resource center).
The
US Supreme court has recently ruled against
Grokster and other file-swapping services.
The
full implications of this ruling are not yet
known, but if you participate in file-swapping
services, or permit their use within your
business network, you
could end up exposing your company to financial
penalties.
Use
caution when introducing unknown external software or
hardware to your computer.
While
boot-sector viruses are no longer the
predominant mode of infection, they still exist
and can cause damage to system files or loss of
your data files.
Next...
top |
|