Methods, apparatuses, and computer-readable media for preventing the
spread of malicious computer code. An embodiment of the inventive method
comprises the steps of: identifying (110) a computer application that is
data mining an e-mail address; determining (130) whether the computer
application associates at least one executable application and the data
mined e-mail address with an e-mail message (120); and blocking (140) the
transmission of the e-mail message when the e-mail message is associated
with the at least one executable application and the data mined e-mail
address.