Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Be Thankful: You Can Be Safe

    By
    Larry Seltzer
    -
    November 22, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Just a few years ago Windows users, even responsible Windows users, had good reason to be fearful of the attack that would slip past their defenses or their notice.

      Things have changed. Nobody should ever be complacent, but a responsible user can be confident that defensive software and good habits will protect them. More interestingly, attacks just arent what they used to be.

      A report by Alexander Gostev, senior virus analyst at Kaspersky Lab, indicates that innovation in malware development is stagnant. There have been no major developments in some time. In fact, there have been no major attacks since the release of Zotob in August 2005.

      Zotob, incidentally, targeted mainly Windows 2000 systems and XP SP1 to a lesser degree. What Microsoft has been saying about XP SP2 is true: Users are much safer running XP SP2 than earlier versions of Windows. Their own data from their Malicious Software Removal Tool (Word .doc file) shows as much, and in fact probably understates the matter.

      There have been a number of small attacks. Some of them, like the WMF vulnerability, enter the background of the malware scene and will be with us for a long time. Perhaps the most prominent security term of 2006 was “targeted attack.” We had quite a few of them, mostly centered around zero-day vulnerabilities in Microsoft Office. See the Kaspersky report for more interesting details on these vulnerabilities.

      The focus on vulnerabilities generally is another point in the report. As I said, there is no innovation anymore in malware—except where it involves the exploit of a vulnerability, especially a zero-day exploit. But even these are often less of a threat than they used to be. A few years ago vulnerabilities brought us attacks like Blaster and Sasser, where users could be infected over the Internet while they were asleep. Now the exploit usually involves substantial user action and can often be blocked by anti-virus software.

      Now Im going to re-ask a question Ive been asking vendors for a while now without what I consider a full answer: How many truly new infections do we have these days as opposed to re-compromises of systems already infected with other malware? I think the latter is where the action has been for a long time now. My theory that a very large percentage of new infections are on already-infected systems has two main arguments in its favor:

      • The systems are compromised, providing a hole through which new malware can attack
      • The users are proven to be willing to click on things they shouldnt

      When you look at the data from AV companies on what the most prevalent attacks are its like a trip through the way-back machine. Look at Sophos report on the Top 10 viruses reported to Sophos in October 2006, and bear in mind that Sophos doesnt have much of a consumer presence, just business:

      1. W32/Netsky-P
      2. W32/Mytob-AS
      3. W32/Stratio-Zip
      4. W32/Bagle-Zip
      5. W32/Netsky-D
      6. W32/Stratio-AY
      7. W32/Mytob-C
      8. W32/Zafi-B
      9. W32/Nyxem-D
      10. W32/Mytob-E

      Next page: Stagnantware.

      Stagnantware

      Netsky-P was discovered, according to Sophos, on March 22, 2004. Its a classic mass-mailer worm of the type that used to generate fear. It was at or near the top of all the anti-virus malware lists until just a few months ago; I suspect all the other anti-virus companies changed their ranking system somehow to dislodge old geezers like Netsky-P that are well past their prime.

      The Kaspersky list, for example, has different attacks, but many of them are still just e-mail worms. Most of these are now downloaders, which means that the attached program just downloads and executes other programs.

      This sort of attack only has a chance of success nowadays if you are doing things that no reasonable person should be doing, principally running software that hasnt been updated in years. For more than five years both Outlook and Outlook Express have, by default, blocked all executables. Combine that with what we know about the enhanced security of newer versions of Windows and its easy to see the problem as one largely of old versions and headed for history some day.

      The last ingredient is behavior: Even on new versions irresponsible users can do irresponsible things. If you go around porn sites and wrestling sites downloading and installing programs and ignoring warning messages you can still get your computer into trouble. This will always be the case, and Windows isnt alone in being vulnerable to bad behavior.

      Even phishing is a problem that is being shown to be manageable by software innovation. The new version of both Internet Explorer and Firefox have phishing filters built in. They arent top-notch yet, but they will get better over time, and other security products, such as Norton Confidential, are adding fraud protection to the PC security mix. Once these are widespread it will be much harder to make a decent living off of phishing.

      /zimages/2/28571.gifThe recent surge in e-mail spam hawking penny stocks and penis enlargement pills is the handiwork of Russian hackers running a 70,000-strong botnet powered by hijacked computers in more than 160 countries. Click here to read more.

      Attackers are left now trying to get through zero-day holes and bizarre new attacks. A good example was discussed recently by John Heasman of Next Generation Security Software: Its possible to hide malware in the memory of PCI-based devices like graphics cards in such a way that they can survive a reboot. These attacks often share a lack of universality for their target. The PCI rootkit attack described in the paper may have to be written specifically to each type of card.

      So as youre relaxing on Thanksgiving (instead of watching the night game, because its on the NFL Network and your mother-in-laws cable system doesnt carry the damn channel!) think about how much better things are than in the past. In a few years computer crime and security attacks wont be gone, but things will be even better.

      Do you get the NFL Network? Let me know how the game went in the Talkback section below.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×