Today's practice of applying security updates after a software vulnerability becomes known or after a virus has been reported will be ineffective in a world of super-fast spreading worms and viruses, warned Symantec chief executive officer John Thompson.
A fresh approach and an armoury of security software and services are needed to combat "Warhol" threats, which spread across the internet and infect systems worldwide within 15 minutes, Thompson said in his keynote at Comdex in Las Vegas.
Standard Bank has become the last major commercial bank to introduce SMS security for its Internet banking clients, although it was the first to upgrade security following the Absa hacker scare four months ago.
All the other major commercial banks have introduced SMS security, in one form or another, over the past 18 months. Nedcor was the first, followed by First National Bank and then Absa, which introduced it as part of its Internet banking security upgrade after a Bellville man allegedly defrauded a number of its Internet banking clients.
It used to be that an anti-virus program was a home user's first (and perhaps, only) line of defense against the spread of viruses, worms, trojans, and other malicious code. Times have changed. In the era of pervasive, always-on broadband connections, today simply having your Microsoft (R) Windows (TM) computer turned on is enough for it to get infected with the latest virus or worm. Have you applied your weekly set of critical Microsoft security patches, or your monthly Microsoft mega-patch? What if you've been on vacation for the past few weeks?
At a time when there is great concern about the security of information technology, few people have a more informed perspective on this critical topic than Chief Security Officers (CSOs). This paper presents the results of a survey taken by several dozen CSOs and includes a discussion on some of the technologies that RSA Security's focus on solutions for identity and access management (I&AM) and encryption.
It wasn't Mary Ann Davidson's worst nightmare, but it was close. A fax from a hacker in the Middle East landed on her desk at Oracle Corp., proclaiming the discovery of a hole in the company's database software through which he could steal crucial information from such customers as Boeing Co., Ford Motor Co. and the CIA. The fax warned Davidson, the company's chief security officer, to contact the hacker immediately — or else. Luckily, the hacker hadn't found a real hole; he'd just misinterpreted a function of the program. More surprisingly, he meant no harm.