Compartmentalize your network to improve security

Wednesday, 3 March 2004, 12:02 PM EST

Malware is on its way toward "zero-day" threats—the time between the announcement of a vulnerability and the implementation of its exploit is shrinking to mere days, even hours. For example, in the case of SQL Slammer, the time from published vulnerability to exploit was half a year; but for MS-Blast, that period was a single month. With dwindling timeframes, there's less chance of a patch being released or deployed before the exploit appears.

As if that weren’t alarming enough, recent threats have shown an unprecedented compression of transmission time. Recently, MyDoom became the fastest-spreading malware threat ever—possibly accounting for as much as 30 percent of all e-mail traffic at its peak. Couple the shrinking vulnerability-to-exploit period with lightning-fast transmission, and you have the greatest worry for many of us in IT: an immensely destructive threat that spreads unchecked, and for which there are no fixes—until it's too late.

By Frederick Felman at Enterprise Systems.

[ Read more ]

Related items




Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victim’s financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //