[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Coming full circle: Subpoena demands FBI return Hunter Biden laptop to Delaware repair shop owner

Famed Signature Room Restaurant in Chicago’s Hancock Tower Suddenly Closes Citing ‘Economic Hardship’

Pakistan: Politicians fight on live debate after Nawaz Sharif’s party leader calls Imran Khan ‘Jewish agent’ and ‘bootlicker’

FBI arrests Proud Boys member who disappeared days before sentencing over role in Jan. 6

Winklevoss twins secretly withdrew $280M in assets before crypto firm collapsed: sources

Leader in Richmond Democrat Party group ARRESTED after posting bomb threat against Andy Ngo Virginia talk

Riley Gaines shares video of trans male violence in school: ‘You can’t hide …’

Connecticut DCF Invites Children To Report On Non-Affirming Parents

Trans activists force anthropologists to cancel conference panel discussing the identification of male and female skeletons

Taiwan Launches the Island's First Domestically Made Submarine for Testing

Bail bondsman Scott Hall takes plea deal in Georgia election interference case

Supreme Court Returns To Mountain Of Cases From Conservative 5th Circuit

Facing A U.S. Anti-Corruption Push In Ukraine, Burisma Demanded Hunter Biden Call Dad

Investigators Subpoena Bank Records Of Hunter, James Biden After Uncovering $20 Million In Foreign Payments

San Diego declares a crisis as feds release thousands into the cit

Democrats sour on Bidenomics as it fails to move the needle for voters

‘Trust the Experts’: 1,600 Scientists Sign Declaration Denouncing Climate Change Hoax

US Refuses to Acknowledge Systemic Use of Torture by Its Armed Forces in Iraq

At the Brink?

As the FCC Revisits Net Neutrality, Let's Remember the Day the Internet 'Ended'

British intelligence in the dock for CIA torture

The End of the Road for the Dollar

Time to end the Fed and its mismanagement of our economy

Thanks to US Policy, CCP Controls Key Resources for US Weapons

Europa, a Girl From West Asia, Raped Again by an American Bull

Brickbat: Just a 'Regular Person'

FTC’s Amazon Complaint: Perhaps the Greatest Affront to Consumer and Producer Welfare in Antitrust History

Julian Simon: Expressing the Imago Dei in Economic Terms

It’s the Beginning of the End of This Whole Phony Economy

Russia Might Call for Extradition of Ukrainian Nazi Honored in Canada, Trudeau Blames Parliament Speaker

New York National Park Site to House Thousands of Migrants in Tent City

Review: Shiny Happy People Charts the Downfall of the Duggar Family

The Problem with a Chicago Municipal Grocery Store

Ukrainian Whoppers

Former major city police detective reveals 50% of SIDS cases happened within 48 hours post vaccine

August border encounters of more than 322,000 highest monthly total in U.S. history

Trump Accuses Pro-Life Groups of Being a Political Liability That Exist to Make Money

MINISTRY SPOTLIGHT: Women’s Resource Medical Centers of Southern Nevada

Washington’s Strategic Overextension

Trump adviser: GOP should ‘end’ primary debates, focus on Biden

When it Comes to Preventing Abuse, are All Churches Equal?

Methodist Community in Religious Freedom Fight Against NJ Regarding Sunday Beach Access

Imperial Footprints in Africa: The Dismal Role of AFRICOM

Biden warns Trump's MAGA 'extremist movement' is a threat to democracy

‘Quiet Crisis’: Food Banks Are Inundated With Requests For Aid As Inflation Bites

Illegal Immigrant Launches Unhinged Assault, Leaves Cop Missing A Body Part

¡Conquista! Illegals Plant Venezuela's Flag on Texas Soil

Biden’s DHSLet 200,000 Illegal Immigrants Fly Directly Into 43 Cities

Korean War Vet Booted to Street to Make Room for Illegal Immigrants

War of Economic Corridors: the India-Mideast-Europe Ploy


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: How Flame Virus Has Changed Everything For Online Security Firms
Source: Agence France-Presse
URL Source: http://www.rawstory.com/rs/2012/06/ ... ing-for-online-security-firms/
Published: Jun 18, 2012
Author: Agence France-Presse
Post Date: 2012-06-18 12:51:13 by Brian S
Keywords: None
Views: 963

Here’s a question: if you connect an unprotected Windows computer to the internet, how long will it take before it is infected by malicious software? The answer is: much more quickly than most lay users think. In 2003, the average time was 40 minutes. A year later it was 20 minutes. By 2008 an unpatched computer running Microsoft Windows XP could only expect five to 16 minutes of freedom. The Internet Storm Centre (ISC) provides a useful chart of what it calls “survival time” for Windows machines. It suggests that a PC currently can expect between 40 and 200 minutes of freedom before an automated probe reaches it to determine whether it can be penetrated. The numbers for other operating systems (such as Unix and Linux) are better (from 400 to 1,400 minutes), but the moral is the same: the only way to have an absolutely secure computer is not to connect it to the net.

On the back of statistics like this, a huge global industry has grown up – the PC “security” business – dominated by companies such as Norton, Symantec, Sophos and Kaspersky. They offer software tools for blocking computer viruses, worms and Trojans (programs that look innocuous but compromise the computer in some way, rendering it controllable by an external agent).

The PC security business does offer a degree of protection from the evils of malware, but suffers from one structural problem: its products are, by definition, reactive. When a particular piece of malicious software appears, it is analysed in order to determine its distinctive “signature”, which will enable it to be detected when it arrives at your machine. Then a remedy is devised and an update or “patch” issued – which is why your PC is forever inviting you to download updates – and why IT support people always look pityingly at you when you explain sheepishly that you failed to perform the aforementioned downloads.

googletag.cmd.push(function() { googletag.display('div-gpt-ad-1331163101011-9'); });

So the security companies are always playing catch-up, profitably slamming stable doors after the horses have bolted. Until recently, the industry has tactfully refrained from emphasising this point, and most of its customers have been too clueless to notice.

This cosy arrangement was too good to last, and a few weeks ago the industry’s cover was finally blown. What happened is that computer security labs in Iran, Russia and Hungary announced the discovery of a virus called Flame, which one researcher has called “the most complex malware ever found”. For at least two years Flame has been copying documents and recording audio, keystrokes, network traffic and Skype calls, as well as taking screenshots from infected computers. And passing all the information it harvested to command-and-control servers operated by its creators. And here’s the really startling bit: in all that time, no security software raised the alarm. It bypassed the “signatures” databases of all the PC security companies.

Nobody knows who wrote Flame, but the consensus in the industry is that it was an expensive high-end creation in the same league as the Stuxnet worm that attacked the Iranian nuclear programme. The odds are, therefore, that it was a product of the security agencies of the US, UK or Israel, or some combination thereof. But because the malware incorporated a “kill switch” that can wipe out all traces of it from an infected machine, and that switch has reportedly been activated, we may never know for sure.

What we can be sure of, though, is that we’ve crossed the threshold into a different world. The old signature-based, reactive approach of the anti-virus industry is not up to this new game. We’re going to need radically different approaches if our societies – and our industries – are going to be able to protect themselves from the imitators and successors of Flame. And for that we’re going to need new metaphors and models. The current anti-virus approach is a bit like playing whack-a-mole, and it’s run its course.

In thinking about this, some companies and researchers are looking to natural systems for inspiration. The human body’s immune response system, for example, is pretty impressive in detecting and dealing with intruders and IBM has used it as a metaphor for its “Digital Immune System for Cyberspace”. The company claims that its system can automatically detect viral activity at a very early stage as well as develop a cure and distribute it across the internet faster than the virus spreads. No doubt other researchers are working on similar ideas. If so, then perhaps we won’t have wasted the crisis triggered by Flame.

Post Comment   Private Reply   Ignore Thread  


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com