Computer Security: Fighting Malware Attacks
,----[ Quote ]
| "People say they've spent a lot of money, but every summer when kids
| are out of school, how many new viruses come out?" he says. "You've
| got to know what's out there, and how to react."
`----
http://www.baselinemag.com/article2/0,1540,2140569,00.asp
The slow death of AV technology
,----[ Quote ]
| AV technology is gradually dying and being replaced by far more
| effective IT security technology based on whitelisting.
`----
http://www.theregister.co.uk/2007/06/08/death_of_av/
Related:
F-Secure CEO: There's more malware than ever
,----[ Quote ]
| DDoS continues to harass people across the world. But is it more,
| is it less? What we are seeing is it is taking up a lot of bandwidth
| and we need to protect people.
|
| I think there could actually be a big shift from commercial to
| political DDoS attacks, such as we saw recently with Estonia
| [and Russia]. Any place where you have political instability
| you could see an increase in DDoS attacks in that region.
`----
http://news.zdnet.com/2100-1009_22-6188138.html
Predicting the demise of antivirus apps
,----[ Quote ]
| "It's the beginning of the end for antivirus," says Robin Bloor, partner
| at consulting firm Hurwitz & Associates, who adds he began his
| "antivirus is dead" campaign a year ago and feels even more strongly
| about it today. "I'm going to keep beating this drum. The approach
| antivirus vendors take is completely wrong. The criminals working to
| release these viruses against computer users are testing against
| antivirus software. They know what works and how to create variants."
`----
http://computerworld.co.nz/news.nsf/mgmt/0047A206FF40A92ECC2572C3000FD867
Note to new Linux users: No antivirus needed
,----[ Quote ]
| One of the most common questions I hear new Linux users ask is "What
| program should I use for virus protection?" Many of them lose faith
| in me as a source of security information when I reply, "None." But
| you really don't need to fear malware on your new platform, thanks
| to the way Linux is built.
`----
http://www.linux.com/article.pl?sid=07/02/13/1637251
Web hacks using 'evasive' techniques
,----[ Quote
| The malicious code on the host website accesses a database
| of IP addresses to determine whether to serve up
| malware or legitimate content.
`----
http://news.zdnet.co.uk/security/0,1000000189,39287357,00.htm
|
|