Vulnerabilities / Threats
12:22 PM
Connect Directly

President Should Have 'Kill Switch' For Internet, Most Americans Say

Worries of Internet security rank below financial, personal, and national security among people worldwide surveyed by Unisys

More than 60 percent of Americans say if a major cyberattack were to occur on the Internet, the president should have the capability to shut down parts of the network, according to a new survey.

Around 80 percent of Americans also say they are limiting access to their personal information and using privacy settings on Facebook and other social media, and 73 percent are keeping their antivirus up-to-date. But they are less vigilant about their mobile devices, with only 37 percent password-protecting these devices, according to Unisys' Security Index survey for the second half of 2010, released this week. And about 46 percent of these users regularly update and use strong passwords for their desktop machines.

"With only 37 percent using passwords on mobile devices, it's probably because people are looking for convenience," says Patricia Titus, vice president and chief information security officer at Unisys. "People are not applying the same security practices to mobile devices as they do to PCs and laptops. And in some instances, these [mobile devices] are more powerful."

As for the "kill switch" support, Titus says respondents could be interpreting what that might entail in different ways. "They might not be thinking about what the implications would mean .. they might be thinking of him blocking a particular country [or attackers]," she says.

Most Americans are less concerned about the security of their online transactions than they are about identity theft. Those who said they are "seriously concerned" about online shopping and online banking security declined from 43 percent in February to 34 percent in August, according to the survey.

Overall, people worldwide are less worried about their security in all categories, with a 125 rating versus 151 in the second half of 2007, when Unisys first launched the survey.

More than half of Americans are "extremely" or "very" worried about national security of the country, 57 percent about identity theft, and 57 percent about credit card and debit card fraud. There were more than 1,000 respondents to the survey.

A full copy of the index is available here for download.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.