{"id":2003,"date":"2003-11-03T00:00:00","date_gmt":"2003-11-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/03\/hp-uses-virus-code-to-protect-its-networks-from-worms\/"},"modified":"2021-12-30T11:40:27","modified_gmt":"2021-12-30T11:40:27","slug":"hp-uses-virus-code-to-protect-its-networks-from-worms","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/03\/hp-uses-virus-code-to-protect-its-networks-from-worms\/","title":{"rendered":"HP uses virus code to protect its networks from worms"},"content":{"rendered":"<p>Hewlett-Packard has demonstrated how computer virus technology can be turned around to protect business networks against hackers and worms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>HP revealed this week that it had used the approach to protect thousands of machines on its network two days before the Blaster worm struck.<\/p>\n<p>The code, developed by HP&#8217;s security research labs in Bristol, effectively saved the company from an infection that cost organisations around the world hundreds of millions of pounds to fix.<\/p>\n<p>Although the technology is still at an early stage, HP sees it as a potential solution to the difficulties companies face ensuring all the machines on their network are patched, often at short notice, against the latest vulnerabilities.<\/p>\n<p>Martin Sadler, lab director at HP laboratories in Bristol, said, &#8220;Tracking kit in any large corporation is difficult.<\/p>\n<p>HP has 250,000 devices connected to its network that we know of.<\/p>\n<p>But we do not necessarily know where everything is.&#8221;<\/p>\n<p>HP began developing the technology two years ago, when it deployed virus-like code to protect its IT systems from the Nimda virus.<\/p>\n<p>The code delivered a pop-up message to every unpatched machine on the firm&#8217;s network, urging the user to take action.<\/p>\n<p>In the case of Blaster, instead of a pop-up warning, the security labs arranged for a code to be pumped out to every IP address on the company&#8217;s network that shut down any machine that had not been patched.<\/p>\n<p>Some users were upset but the code protected HP from infection.<\/p>\n<p>Sadler said the technology was still at an early stage, and there were still many questions that had to be resolved before the technique could be used commercially.<\/p>\n<p>Companies using the technology would have to weigh-up the risk of virus-like code designed to protect against new vulnerabilities falling into the wrong hands and being used to develop malicious code with devastating payloads.<\/p>\n<p>More info: [url=http:\/\/www.computerweekly.com\/articles\/article.asp?liArticleID=126146&#038;liArticleTypeID=1&#038;liCategoryID=2&#038;liChannelID=22&#038;liFlavourID=1&#038;sSearch=&#038;nPage=1]http:\/\/www.computerweekly.com\/articles\/article.asp?liArticleID=126146&#038;liArticleTypeID=1&#038;liCategoryID=2&#038;liChannelID=22&#038;liFlavourID=1&#038;sSearch=&#038;nPage=1[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2003","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2003"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2003\/revisions"}],"predecessor-version":[{"id":4490,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2003\/revisions\/4490"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}