The US government gets serious about electronic threats.
Internet.com reports about the logic behind unpatched systems. A lot of it goes to the fact that system administrators are deluged with new patches and are fed up of high level alerts on inessential patches. However, when a system crashes, the blame falls squarely on the shoulders of the system administrator. In order to resolve this, two things need to happen: First of all, there needs to be a better understanding overall of what danger security vulnerabilities represent. When it comes down to it, it is not just the system administrator responsibility to ensure that systems are secure. If software developers are careful in their implementations and consider security implications of the choices they are making when designing and developing software, the risk of an exploit is lowered. Secondly, there is a need for better education in general. Most user neither know or care about vulnerabilities. By default, most machines are not even set to auto-update. There are a number of ways this can be solved. Operating System vendors like Apple, Microsoft, and Redhat already offer an automated way to apply patches to a machine. These tools should be turned on by default to ensure that “most” machines get patched…Read More
A new worm called Hybris has been spreading across computers in Europe, the United States and South America. While it currently carries a non-destructive payload, some Anti Virus developers are worried that its plug-in architecture could turn it into a much more dangerous virus, opening backdoors in computer systems and escalating the war between virus makers and anti-virus developers. First discovered in South America by Kapersky Labs, a Russian anti-virus developer, the worm has spread through email to Europe and the United States at an increasing pace. “Hybris is one of the more common virus we’re seeing right now,” said Brian Kinj, a member of the technical staff at the CERT coordination center. Because it carries a non-destructive payload, the anti-virus community has been split over the threat level the virus represents. In the United States, the Joint Task Force Computer Network Defense, a division of the US department of defense, has upgraded the virus to a high-risk status. Meanwhile, European virus tracker Peter Kruse, of virus112.com, has announced on Usenet that his company was upgrading the virus threat to a medium risk status, due to the recent spread of the virus in Europe. Companies like Symantec and Sophos, however,…Read More