Security Threat Changing, Says Symantec CEO 78
narramissic writes "At the Symantec Vision event in Tokyo Thursday, chairman and CEO John Thompson spoke about a shift his company has observed in the threat posed to computer users and companies by hackers. 'While a few years ago many people were much more focused on attacking the machine and attacking the broad-based activities that were going on online, now all of a sudden we've noticed a significant shift in both the type of attack and the motivation of the attack,' he said. 'The attacks that we see today are more targeted and more silent and their objective is to create true financial harm as opposed to visibility for the attackers.'"
Jack Thompson (Score:2)
Re: (Score:2)
Re: (Score:1)
Script Kiddies Growning Up (Score:3, Insightful)
Re: (Score:1)
KFG
Re: (Score:2)
0h w3llllz, Il'l ju57 us3 |\/|y b0t5 7o m4k3 mr0e m0nnnn3333yyyyy and t0 sh0w th4t b1tch.
(Do I really need the humour tags around this post?)
Re: (Score:1)
Re: (Score:2)
It isn't just script kiddies. Organized crime has been making moves into computer crime for some time. There are others too.
Transnational Crime Syndicates [technewsworld.com]
Organized Crime Invades Cyberspace [computerworld.com]
Cyber Threat Source Descriptions [us-cert.gov]
Heh (Score:3, Funny)
Marketing Department: There's this... threat, yeah, threat... to like, businesses. They have a lot of money... maybe we can sham them for a few more years?
CEO: Brilliant!
Re: (Score:2)
CEO: Quick! Our products are too badly written to rewrite them for Vista, and Microsoft is locking us out of the kernel anyways! We need a new business model!
Re: (Score:2)
-Rick
Re: (Score:2)
Re: (Score:2)
Targetted attacks to acquire indirect access to systems (take over your VPN in to the office), customer information, technology under development, or even some freak stalking some cutie on the second floor are all very real threats.
The technology is easy. The attacks are only as difficult as accessing the resources to deploy the attack -- and most major corporations and government agencies have such resources. If a cracker seizes control over those resources, even temporarily, they can do a lot more th
Duh,,, (Score:1)
Re: (Score:2)
"People want money, and some are willing to use their programming skills with computers to steal your hard-earned cash! This story and more at eleven."
Did anybody else not realize in 2002 that malware was just a way to make worms and trojan financially profitable?
Broad-based activities going on online? (Score:1)
What the heck does that even mean? As best I can tell from context in TFA, it's a typographical error, and they meant "board-based," which makes sense when paired with the idea of simple defacement. But I could also see it being corporate-speak for "a broad range of attacks" or something.
"Broad-based" sounds like a pornographic term, as opposed to "dude-based" I suppose. Which also makes some sense, since pornographic sites seemed like high-profile targets for defacement.
Re: (Score:1)
wtf: lameness filter won't allow "wth" (Score:1)
Good idea (Score:3, Interesting)
Re: (Score:1)
About time... (Score:3, Insightful)
Oooh, that virus sends itself to all your buddies in your address book. How TERRIBLE! Wow, a virus pops up windows on your screen even though you didn't ask for it. How NAUGHTY!
When I started using PC's, viruses would wipe out your entire drive. They would delete critical files. They would overwrite your boot sector. They would wipout your FAT table. Now THOSE were some viruses!
Once viruses get back to the level of actual harm, maybe people will stop clicking around willy nilly and will start to invest--on both the corporate and consumer sides--in some real security.
Re: (Score:2)
with vacuum tube shards in your eye.
Re: (Score:1)
The Internet has helped viruses/worms along as well, since they can now travel through time zones in a matter of seconds. In the old days, they generally had to be transmitted through floppies. Rates of infe
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
1. There is NO REAL security available in any form of Windows. Users will have to change from Gatesware to something that works properly.
2. The latest Windoze viruses allow a few reboots (to ensure they've spread themselves) before largely refomatting the hard drive that Windoze is on. It's pretty brutal, but
Boy he's right about that! (Score:3, Funny)
It's preloaded on new computers and there's nothing you can do to prevent it. Once you get the computer, it begs you to install it, if you do, god help you. If you change your mind about using norton, well... you've got a long night ahead of you, crack open a bottle of wine and fire up regedit.
And if you don't uninstall it, and let it lapse, it'll be peppering you with "renew norton!" for the next thousand years. Ditto with McAffee.
These cures are worse than the disease. At least a zombied computer isn't spitting up "Renew NOW" dialog boxes.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
These people are crooks.
Re: (Score:2)
Re: (Score:1)
thats real AV like symantec used to be:
functional with a minimal frontend www.eset.com
not true (Score:2)
Looks like his way of scaring people (Score:1)
I am not very sure he is raising this issue just to justify his AV product's position in the current turmoil due to the new M$ policy.
As if Symantec is an authority (Score:2, Interesting)
"We do virus *detection*, not necessarily virus removal."
You're telling that crap to a Gold support customer, Symantec, and you expect those of us in the field to give a tin shit what your opinion is?
Word of advice: quit expressing opinions and start doing your goddamned job.
targetted attacks are common (Score:2)
C'mon, we already saw 'Ghost In The Shell...' (Score:2)
Now if only we could authorize a company of elite paramilitary types to give script kiddies and spammers the same treatment... (evil grin).
virus clusters and rootkit catalogs (Score:2)
Symantec CEO just put foot in mouth... (Score:2)
After all, AV signature is only generated AFTER the V is seen in the wild.
What we are talking about here would be very directed V (and other attack vectors). There are solutions, but the only way the Symantec can offer them is by converting to a service (not product) model.
That's putting your foot in your mouth, CEO...
Unless, of course, Symantec comes up with a proactive product solution (as much as
Re: (Score:1)
Not true.
If an admin knows that his company is being attacked he can make sure that all systems within the company get updated anti-virus definitions IMMEDIATELY instead of on a time interval.
There are solutions, but the only way the Symantec can offer them is by converting to a service (not product) model.
That's putting your foot in your mouth, CEO...
LOL!
Talk about putting your foot in your
Re: (Score:2)
And there is the weakness: "If an admin knows", Deepsite "Enabling proactive protection through the rapid delivery of actionable Early Warning security information".
An interesting use of the word "proactive" in computer security. In my books, that is STILL reactive to threats. The reaction is to send out "early" warnings. Again, useless against a directed attack.
And what would such an attack look like? Comission a scan of a binary (say), fuzzing it. Not reporting the results, but using this as an attack vec
Re: (Score:1)
At the macro level it is, at the micro level it isn't (at least not always). Many machines can be protected from a threat before they're ever subjected to attack.
Re: (Score:2)
Many companies feel secure after installing Symantec, or subscribing. "It is now secure..."
In a way, Symantec is trying to provide "good enough" security, without providing security at all in a real sense.
An example (real, but the names have been changed to protect the not-so-innocent), A governemnt organization keeps donor records for transplants. The information is promised to be "completely confidential". And yet, I receive a letter that the information has been
Re: (Score:1)
Well, I'm not a Symantec salesperson, but apparently, such a feature [techtarget.com] is on the way.
And to be fair to the other vendors, companies such as McAfee are also addressing this issue [eweek.com].
It's a serious threat!! (Score:1)
Be Scared ... (Score:1)
John Thompson's speech sometime in the future... (Score:1)
Re:John Thompson's speech sometime in the future.. (Score:1)
They should say "Network Hackers" or "Criminal Network Hackers", just to clarify it. More than likely though, the people who are doing this stuff are just script-kiddies and the real hackers are causing very few people harm.
Took him 'til now to realize? (Score:2)
Malware that is used to spread more malware (i.e. mail worms etc)
Malware that the first malware spreads that siphons money from you.
Now that we crack down on their servers (because you have to gather the info somewhere), and with the increasing speed we can do this (currently we're at about a week between detection and shutdown, and we're getting faster), I can see the advent of a third group: Malware that
Symantec, and other Dinosaurs that are slow moving (Score:2)
I think it is more the case that Symantec and the other well-established Information Security vendors are like dinosaurs stuck in hot tar. The environment around them is rapidly changing, and the smarter of them are now starting to recognise that their existing income streams are becoming less relevant - as Microsoft makes security improvements to their OS, and the attackers continually test against the security products to improve their ability to avoid detection. Now that they are identifying it, it is
Hmmm (Score:1)
this is ~obvious~, but what it boils down to is a change in the economic realities. In the past, virus writers and other miscreants did what they did for social reasons: a sense of power, peer recognition, proof of concept, etc... Today, spammers, identity thieves, scammers, and so-on are paying cold hard cash for access to bot nets and/or comprised systems or the in