{"id":846,"date":"2007-10-13T00:00:00","date_gmt":"2007-10-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/10\/13\/f-secure-user-education-no-security-solution\/"},"modified":"2021-12-30T11:38:15","modified_gmt":"2021-12-30T11:38:15","slug":"f-secure-user-education-no-security-solution","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/10\/13\/f-secure-user-education-no-security-solution\/","title":{"rendered":"F-Secure: User education no security solution"},"content":{"rendered":"<p>Education is not a viable solution for preventing security issues, according to Patrik Runald, F-Secure&#8217;s senior security specialist.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Runald said the rising occurrence of &#8220;drive-by&#8221; downloads is &#8220;most worrying&#8221;, referring to the situation whereby a Trojan, embedded in a website, surreptitiously downloads itself onto a user&#8217;s system when the page is visited.   The only solution, the security expert said, is vigilance in ensuring all security software is constantly updated, so that the user can be protected from threats they do not see.  &#8220;Even if people have been educated on safe surfing, they either forget or don&#8217;t care,&#8221; Runald said.<\/p>\n<p>Mobile security Runald also noted that the technology is available to cause serious damage on mobile devices.  According to the security expert, 99 percent of mobile malware is targeted at the Symbian operating system (OS) because it is the market leader and its source code is open, making it easier to examine the OS for vulnerabilities.  Referring to Apple&#8217;s iPhone, Runald said: &#8220;In theory, by having a closed OS, it should be safer.<\/p>\n<p>Offering an explanation as to why a mobile malware pandemic has not yet occurred, Runald said there has not been a concerted effort by mobile virus coders because they tend to be &#8220;kids&#8221; who are interested in &#8220;a bit of fame and mischief&#8221;, rather than being motivated by profit like those who code for PCs.<\/p>\n<p>However, Runald cautioned that this does not rule out the possibility of a mobile malware outbreak.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/security\/0,1000000189,39289980,00.htm?r=1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-846","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=846"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/846\/revisions"}],"predecessor-version":[{"id":3333,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/846\/revisions\/3333"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}