Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Malware: More Hype Than Reality
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/22/2014 | 9:04:02 AM
Re: Protected Against 12,543,654,654 threats
Totally agree somedude8 - those notices go beyond funny, they are downright annoying & counterproductive -- just like a nagging spouse (mine totally excepted from that characterization). I so appreciate the warnings that something in my AV software is out of date, but not when it's a thinly veiled attemped to get me to upgrade to a more expensive package. Those kinds of activities work against the anti-malware industry, especially companies selling to consumers, who will get frustrated and not adopt the security practices necessary to prevent an attack. We all know that consumers are bringing their devices into enterprise networks in drove. So everyone is at greater risk....
jagibbons
50%
50%
jagibbons,
User Rank: Strategist
1/21/2014 | 7:19:22 PM
Re: Users are the weak link
You can never go wrong with higher awareness and more training. Most people learn by repetition, so keep drilling it into their heads. That can also be a lot less expensive than expanding the set of technical security tools to protect the network.
Somedude8
50%
50%
Somedude8,
User Rank: Apprentice
1/21/2014 | 4:01:49 PM
Protected Against 12,543,654,654 threats
I always find it funny how anti Malware programs go way out of their way to let you know that they have protected your system against {insert ludicrous number here} threats since the date it was installed. And how almost every single one of those 'threats' is a cookie.
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
1/21/2014 | 12:46:30 PM
Related: Target, Neiman Marcus Malware Creators Identified
Update on the biggest malware story of the day: Target, Neiman Marcus Malware Creators Identified
Andrew Froehlich
50%
50%
Andrew Froehlich,
User Rank: Apprentice
1/21/2014 | 12:37:38 PM
Re: Users are the weak link
I agree 100% @jagibbons - But it's been my experience that much more focus on prevention tools and very little on education.  While it's true that people will make mistakes, the more education regarding malware and social engineering they receive, the less likely they'll make stupid mistakes that let malware in.
David F. Carr
50%
50%
David F. Carr,
User Rank: Strategist
1/21/2014 | 12:37:07 PM
It pays to be paranoid
I've very rarely had problems with malware on any computer I've owned or operated, I think probably because I'm reasonably paranoid about clicking on links or downloading software from unfamiliar sources. I know drive-by attacks are supposed to be possible, but I haven't experienced them. (Should I say, "that I know of"?)

Of course, it also pays to be paranoid enough to run scans on your computer regularly and particularly when it's acting strangely in case something evil has taken root.
Andrew Froehlich
50%
50%
Andrew Froehlich,
User Rank: Apprentice
1/21/2014 | 12:33:35 PM
Re: Education
To reiterate...in no way do I think that the use of malware prevention and mitigation tools should be cast aside. They are clearly beneficial. My point is that so many in IT security are laser focused on these tools that we often forget that most malware can be easily prevented with proper end-user education.
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
1/21/2014 | 9:08:56 AM
Re: Education
To melgross's point about the comment spam, we're on the case. It seems to be particularly egriegious over the weekend, when there are fewer editotrs to spot it and remove it. We're seeking an automated solution. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/21/2014 | 8:32:19 AM
Re: Education
This is a great thread -- and I'm glad the headline (in the wake of the Target breach) captured everyone's attention. Of course malware need to be taken seriously. But users -- even sophisticated one -- are also very vulnerable to many other kinds of attacks -- attack that require constant education and re-education. 

I read, edit and write about security every day and I know how easy it is to become jaded and complacent about best user security practices, so it's incumbent upon management to constantly remind employees of the risks -- and how to avoid them. 
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
1/21/2014 | 6:54:35 AM
Re: Education
That's a fair point. Malware is often dependent on the user heading to a less than repuitable site, but if links to those sites are spammed on safe ones, it's harder to avoid. 
Page 1 / 2   >   >>


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3318
PUBLISHED: 2021-01-27
attach/ajax.php in DzzOffice through 2.02.1 allows XSS via the editorid parameter.
CVE-2020-5427
PUBLISHED: 2021-01-27
In Spring Cloud Data Flow, versions 2.6.x prior to 2.6.5, versions 2.5.x prior 2.5.4, an application is vulnerable to SQL injection when requesting task execution.
CVE-2020-5428
PUBLISHED: 2021-01-27
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
CVE-2021-20357
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194963.
CVE-2020-4865
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190741.