Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 24 August 2009

Security players form alliance to tackle malware

Posted on 10:44 by Unknown
AVG & other AV experts join forces to develop industry standards & best practices to keep consumers protected online

by Michael Smith (Veshengro)

IEEE's Industry Connections Security Group aims to formalize sharing of malware data among security players, while an analyst warns its focus may be too narrow.

A new security alliance has been established to formalize information sharing on security protection and develop industry standards and best practices.

The Industry Connections Security Group (ICSG) is parked under the IEEE Standards Association and includes mostly security heavyweights and antivirus players. The founding members are AVG Technologies, McAfee, Microsoft, Sophos, Symantec and Trend Micro.

Announcing the group in a blog post on Monday, Mark Harris, vice president of SophosLabs, said security researchers had a tradition of sharing virus samples, but that the sharing arrangements are often "based on individual relationships rather than formal agreements".

The formation of the group makes for a "more organized" security industry in the current landscape, where attacks are increasingly structured and malware samples grow at "astonishing rates", Harris said.

The ICSG currently has a malware working group but intends to add other working groups over time.

According to a presentation document dated 20 July, the group aims to improve the efficiency of collection and processing of the millions of malware file samples handled by security vendors each month by focusing on an XML-based metadata sharing standard. The standard is expected to undergo ratification by the end of this month.

Graham Titterington, principal analyst at Ovum, noted that the announcement of the group was both interesting and confusing. The rationale for the new alliance was the need for a more comprehensive approach to countering malware writers, but the focus of the group appears to be limited, he said.

"The group addresses all aspects of malware and its membership includes most of the main antimalware vendors – Kaspersky being the most notable absentee – and so the ICSG represents progress on countering the so-called 'blended threats'," he said.

"However, it does not seem to be taking the battle to the criminals or probing the criminals' business networks. The focus is on setting up the infrastructure and protocols to allow rapid information sharing on threats and making the day-to-day operation of the members more efficient."

Titterington added: "I would have expected a body affiliated with the IEEE to be putting more emphasis on the development of improved methods for disrupting criminal activity and on new ways of protecting users."

The problem with all of this still does not and never can address the real problem in the equation and that is called “stupidity”.

Too many users fall prey to their own stupidity by replying to certain emails or by opening things they should know better not to.

Many users have first of all no idea that they need AV and other anti-malware software and the most important thing is that most do not understand that their protection – if they have it – is only as good as the latest update.

“Update? What you mean update”, I get from many people, showing that they have no understanding that they need to update their AV and anti-malware software. Help!

Also, too many people think that (1) they cannot afford AV and anti-malware software and (2) because they think that only bought proprietary software will perform.

Both of those fears are, obviously, unfounded and for the ordinary user and the SOHO and SME, free versions of, say, AVG and others are more than adequate and in many instances it has been shown that the free versions outperform expensive, paid-for software.

The important thing, as mentioned before, is to keep any such software updated for your protection is only as good as the latest update.

Although many such software use heuristic systems to recognize patterns in an attempt to catch the “zero-day” attacks this may not always be successful and hence one should try to update with the latest signatures several times a day ideally.

The biggest problem as to infections of computers and networks are users that do not use their brains. Why would anyone want to click on a link to that says, for instance “see Brittney Spears' naked pictures” or that claims that something is breaking news such as “war with Russia declared” when there has been nothing about that on the radio, for instance.

The user often is the weakest link.

© 2009
<>
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ▼  August (30)
      • Leona Lewis music hack may be publicity stunt
      • US Court Grants Finjan a Permanent Injunction for ...
      • Swisscom IT cuts time spent on firewall management...
      • Amazon cloud evangelist to give Storage Expo openi...
      • Crown Plaza Venice hotel booking fiasco could have...
      • Fowlers Revs Up With Numara Track-It!
      • Twitter security move positive but is it it enough?
      • Stolen Lincoln playgroup laptop highlights danger ...
      • Mobile laptop usage soaring - but what about compa...
      • Security players form alliance to tackle malware
      • 1.7 million reasons for local authorities to use p...
      • “VirtualiSation and the Other Green Computing Init...
      • Cross site scripting (XSS) flaws hit the Ministry ...
      • Britney Spears hack highlights reputational risk o...
      • CREDANT Technologies extends data protection to Ma...
      • Compliance does not guarantee security
      • Staff&Line Partners with ProServ
      • Microsoft announces Office 2010 web applications
      • Weak cloud password security highlights strength o...
      • Peru makes a big statement about reusing rather th...
      • FSA £3m fine on HSBC could easily have been avoided
      • Twitter down again - another attack?
      • Pro-Georgian blogger was the target of Internet at...
      • Finjan Prevents Zero-Day Exploit of Adobe Acrobat ...
      • Microsoft and Yahoo cooperate on Search
      • DESlock+ Achieves ‘Five Star’ Accolade
      • Instant message dangers are growing
      • Google promises end to viruses - Fortify says: don...
      • Criminals could capture data from wireless keyboards
      • Loyal Employees or Snooping Staff? You Decide
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile