Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Viruses and spam hit small firms harder

Posted on June 15, 2004December 30, 2021 by admini

A survey by Bank of Scotland (BoS) found that 37 per cent of UK small firms were being badly hit in the pocket by spam and viruses, such as the SoBig outbreak which hit many businesses earlier this year. The study found that the while the cost of minor data losses and firewalls is less than £1,000 a year for two-thirds of small firms, a full-scale virus attack can be terminal for entrepreneurs on tight budgets.

For one in fifty businesses polled, the cost of computer viruses was over £10,000 per year. A further 40 per cent of bosses claimed that junk email significantly added to their costs, with one in ten losing an estimated £10,000 year through lost productivity and the cost of filtering systems.

Multiple unwanted faxes are also a headache for small firms, with over half of those surveyed claiming that the cost of receiving and handling junk faxes was a significant problem.

Firms in London were most concerned about the impact of computer viruses, while Newcastle businesses were most likely to suffer from a high volume of spam. The research suggests that anti-spam laws, introduced by the government last year, have done little to ease business concerns over the impact of junk email on productivity and profits. Although individuals are now banned from sending emails and other communication to users without prior consent, the laws only apply in the UK and has done little to stem the flood of junk from the USA.

Computer viruses continue to pose a serious threat to small firms, who often do not have the resources to properly protect their IT systems or recover lost data. Eddie Morrison, of BoS, said that computer viruses are clearly one of the scourges of our business age. “The cost of protecting systems with ever more advanced firewalls can be expensive in itself but compare to that the devastation of losing important files to a virus. It has also become increasingly easy for small firms to be bombarded with multiple unsolicited emails and faxes for advertising and other purposes. Though less often seen as a direct threat, it can generate significant costs to the unsuspecting recipient.”

More info: http://www.theregister.co.uk/2004/06/15/viruses_hit_small_biz/

Read more

HP Expands OpenView For Adaptive Enterprise

Posted on June 14, 2004December 30, 2021 by admini

The portfolio, rolling out this week, is the latest addition to its Adaptive Enterprise strategy. Todd DeLaughter, vice president and general manager of HP’s Management Software organization, said the suite will integrate with the outfit’s OpenView management platform. The idea is to help CIOs link business and IT for real-time management, a key ingredient for HP’s Adaptive Enterprise play, the executive said.

In the Business Management sector, HP OpenView Business Process Insight is software that monitors business processes and their relationships to the applications, and IT resources on which they depend, DeLaughter told internetnews.com.

Infrastructure Management watches over servers, storage, networking, PCs, printing and imaging and utility-based resources.

HP has long offered management products and services under its OpenView platform, but the Palo Alto, Calif., systems vendor has shifted its focus to help CIOs drive out complexity in environments with disparate products, as well as the cost associated with managing those zones. But HP has also struggled to define Adaptive Enterprise — its version of utility, on-demand computing or real-time computing — in a market populated by IBM, Computer Associates, Sun Microsystems and VERITAS Software.

More info: http://www.internetnews.com/ent-news/article.php/3367461

Read more

Antivirus vendors await major Linux worm

Posted on June 11, 2004December 30, 2021 by admini

Many have developed Unix antivirus products, but are only now moving to Linux to deal with potential threats to businesses running both Windows and open source software.

Network Associates recently released its first Linux server antivirus software, citing the need to stop the transmission through Linux servers of malicious code aimed at Windows.

“Linux has been inherently more secure than Microsoft and the latter has also been targeted more heavily,” said Roger Levenhagan, managing director of Trend Micro UK. “But the full force of the antivirus industry won’t be devoted until Linux gets hit hard by a virus, and then consumers will demand it. We have products out there that address open source software but all the emphasis is still against Microsoft in the short term.”

The ADM worm was the first virus aimed specifically at Linux users and appeared briefly in 1998.

Symantec chief executive John Thompson confirmed in a statement that his company would “deliver a Linux desktop antivirus solution to the market” at some point this year, but did not give a time scale for development.

Graham Cluley, senior technology consultant at Sophos, added: “Linux has a better history for security than Microsoft, and hackers are more focused on Microsoft.

More info: http://www.infomaticsonline.co.uk/News/1155836

Read more

Cisco warns on Catalysis DoS danger

Posted on June 11, 2004December 30, 2021 by admini

The flaw can be activated by sending an incomplete transmission control protocol (TCP) handshake and can bring down the switch.

The Catalysis 6000, 5000, 4500 and 4000 series are all affected, as well as earlier switches that use the same code base. The company said in a statement: “Cisco is aware that some versions of the Cisco CatOS software may be susceptible to a TCP DoS attack under certain circumstances. Cisco has published a security advisory with mitigation techniques and free software upgrade information that may help customers protect themselves from potential exploitation. To date, Cisco is not aware of any active exploitations of the vulnerability and is working closely with its customers to address this issue.”

The flaw can be fixed by either a software patch or by reconfiguring the switch.

Only users of Telnet, HTTP or SSH services are vulnerable.

More info: http://www.vnunet.com/news/1155779

Read more

Computer intrusion losses waning

Posted on June 11, 2004December 30, 2021 by admini

Nearly 500 computer security professionals in US corporations, government agencies, financial institutions, medical institutions and universities responded to the 2004 survey, with 53 per cent reporting that their organization experienced unauthorized use of computer systems during the prior 12 months – down from 56 per cent in 2003.

Thirty-five per cent believed they had not been breached, and 11 per cent said they didn’t know.

Overall financial losses totaled out to $141m for the 269 respondents willing to quantify their losses, down significantly from 251 respondents reporting $202m in losses in 2003.

Reported losses to intellectual property theft plummeted to $11m in 2004, putting denial of service attacks in the number one spot as the most expensive computer crime, allegedly causing $26m of the total losses.

Twenty-eight per cent of the respondents said their organization had insurance policies to help manage cybersecurity risks.

Despite federal government efforts to encourage information sharing between industry and the Department of Homeland Security, the survey “detected no increase in the disposition to share information about security intrusions,” according to the report.

The percentage of companies suffering intrusions who reported them to law enforcement dropped from 30 per cent to 20 per cent; the most common reason for keeping an intrusion quiet was fear of negative publicity, a factor for 51 per cent of the companies that failed to report a breach.

While comparisons with previous years may be enlightening, the CSI/FBI survey is decidedly unscientific: the sample pool is self-selected from a panel of computer security professionals. CSI director Chris Keating cautioned against drawing overly optimistic conclusions from the downward trends reported in the study. “Obviously, computer crime remains a serious problem and some kinds of attacks can cause ruinous financial damage,” Keating said in a statement. We don’t believe that all organizations maintain the same defenses as our members – financial damages for less protected organizations are almost certainly worse.”

More info: http://www.theregister.co.uk/2004/06/11/csi_fbi_computer_intrusion/

Read more

Gartner: Misconfigured APs Cause Most WLAN Breaches

Posted on June 10, 2004December 30, 2021 by admini

“Whether hackers are able to enter a company’s WLAN through an unprotected AP or through a peer workstation, once they are associated with the network, they will be difficult to detect because they may not be visible in or near the network site,” said John Pescatore, vice president and Gartner fellow.

Pescatore made his comments at Gartner’s IT Security Summit this week in Washington D.C. He said that it is essential that enterprises prevent rogue APs and that “official” APs are configured correctly.

To do that, enterprises should install their own wireless intrusion detection sensors and not rely on methods such as having IT personnel walk the hallways with wireless sniffers.

More info: http://www.mobilepipeline.com/showArticle.jhtml?articleID=21700070

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme