Access "Unintentional benefits: Attackers force search for better Trojan virus protection"
This article is part of the June 2004 issue of Exposed: Why your AV software is failing to protect you
Everyone should applaud last month's arrest of Sven Jaschan, the German wunderkind who created the Sasser worm. It's a tremendous victory, to be sure, for digital G-men who rarely get their malware-creating man. Without a doubt, there's no justification for creating and releasing malicious code like Sasser. The standard defense of "I was only trying to improve security by showing companies how weak their security is," is bunk. Viruses and worms cost corporations hundreds of millions of dollars each year in AV defenses and inflict billions of dollars in damages. Nevertheless, we're compelled to recognize the benefits for the enterprise community of the rapid-fire release of new viruses and worms. Many security teams are paying more attention to vulnerability announcements, intelligence reports and patch releases than in years past. Gone are the days when security crews could leisurely update their defenses. Last summer's Blaster worm appeared just 26 days after the release of the RPC-DCOM vulnerability. Jaschan's Sasser was in the wild 17 days after the ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Antivirus software comparison, 2004: Not all AV products are equal
Your desktop AV may be leaving you wide open to attack.
-
NAC best practices and technologies to meet corporate security policy
by Curtis Dalton, CISSP
New solutions help you secure endpoints
-
Antivirus software comparison, 2004: Not all AV products are equal
-
-
Physical and IT Security: Overcoming Security Convergence Challenges
Physical and IT security convergence seems just one leap away...and may remain that way. Learn how to overcome security integration challenges.
-
Six Sigma and CMM models offer security best practices
Security can learn a lot from Six Sigma, CMM and other established business methodologies.
-
Physical and IT Security: Overcoming Security Convergence Challenges
-
Columns
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
Editor Lawrence M. Walsh says creative attackers are unintentionally aiding the search for better security defenses.
-
Firewall and system logs: Using log file analysis for defense
by Marcus Ranum
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
-
Prevent data loss, theft with secure data outputs
by Pete Lindstrom, Contributor
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
-
Linux malware: Challenges of the Linux worm
Should Linux users brush off concerns about malware plagues? Short answer: No. Learn more about Linux malware and the challenges posed by the Linux worm.
-
Internal security controls and business continuity go hand in hand
Learn the top four quality of security beliefs and see why better security means better quality.
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO