Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Technical Specifications of Proxy Sentinel™ Pricing and availability of Proxy Sentinel™ About Internet Security.ca and GCIS Frequently Asked Questions Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca and GCIS and order your Proxy Sentinel™

Internet Security Industry News

Waiting for the worm to turn up

Save your company's valuable data with Proxy Sentinel™ from Internet Security. Click here for all the details.

August 1st, 2003

With all the black clothes and fatalism, security researchers here might as well be attending a conference on late Russian authors. The black clothes go with the security territory at the Black Hat Security Briefings; the fatalism comes from waiting for a worm writer to take advantage of a widespread Windows vulnerability. The vulnerability was made public by the software giant on July 16.

Nine days later, a hacking group in China and an American security researcher released code that exploits the flaw. Security experts are now just waiting for the other shoe to fall. The fear: The DefCon hacker convention being held this weekend will be the trigger for some online vandal to write a worm.

"Oh yeah, there is a lot of awareness right now," said Marcus Sachs, cybersecurity program director for the U.S. Department of Homeland Security. "We definitely have the three watches paying attention." The three watches are the Federal Computer Incident Response Center (FedCIRC), the National Communications System (NCS) and the National Infrastructure Protection Center (NIPC).

The Department of Homeland Security issued an alert earlier this week warning companies and government agencies to lock down their systems. "Because of the significant percentage of Internet-connected computers running Windows operating systems and using high-speed connections (DSL or cable, for example), the potential exists for a worm or virus to propagate rapidly across the Internet carrying payloads that might exploit other known vulnerabilities in switching devices, routers or servers," the agency warned.

Microsoft personnel at the conference also carried an air of fatalism about the worm. Members of the Secure Windows Initiative said that the company was on watch. Other sources indicated that the company was taking extraordinary steps, such as requiring employees to patch their machines quickly or risk being disconnected from the corporate network. The software giant had been hit hard by the SQL Slammer worm, a self-spreading program that took advantage of a six-month-old flaw that even Microsoft hadn't completely excised from its systems.

A security manager from a large financial firm said that the patching process was being slowed by the large number of computers that had to be fixed. "We are making progress," he said. "But we still only have half our systems patched."

The gloomy outlook is not universal. A systems administrator for a university research institute said that his group had machines patched and had added firewall rules to limit the potential of being hit. "If we aren't ready now, we never will be," he said.

Source: Netcraft


Save Internet Security.ca's URL to the list of your favorite web sites
in your Web browser by clicking here.

Back to the top of the page.         
Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet Security.ca 2003    Terms of use    Privacy agreement    Legal disclaimer