Yesterday we wrote about Microsoft's risk that impacts people's lives. Blame Microsoft's utter negligence [1, 2, 3] for it. Where there is deliberate negligence there is also liability and responsibility.
During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or mitigate such an attack to an extent that would not affect considerably the everyday life of its citizens.
A malicious software program has infected the computers of more than 2,500 corporations around the world, according to NetWitness, a computer network security firm.
Virus has breached 75,000 computers: study
A new type of computer virus is known to have breached almost 75,000 computers in 2,500 organizations around the world, including user accounts of popular social network websites, according Internet security firm NetWitness.
City of Norfolk hit with code that takes out nearly 800 PCs
Malicious code that mysteriously found its way onto an internal virtual print server took out nearly 800 computers used by the city of Norfolk, Virginia, last week.
The code apparently was activated when workers shut down their computers, said Hap Cluff, IT director for the city of Norfolk. "It was triggered by the action of logging off," he said. "
The code nearly wiped out the C drives of the 784 affected computers and essentially deleted the Windows operating system. The contents of the system folders on those machines, normally about 1.5GB in size, shrunk to 500 MB, he said.
Hap Cluff, director of the information technology department for the City of Norfolk, said the incident began on Feb. 9, and that the city has been working ever since to rebuild 784 PCs and laptops that were hit (the city manages roughly 4,500 systems total).
Just as they did last year, over thirty international security organisations have come together, to publish a list of the 25 most dangerous programming errors leading to vulnerabilities that can be exploited for cybercrime and espionage. The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors has been updated with a number of improvements to how the errors are graded, prioritised and categorised. For example, new "Focus Profiles" allow readers to quickly see the listed errors sorted for particular professionals' interests.
--Brian Valentine, Microsoft executive
Comments
Needs Sunlight
2010-02-19 07:13:52
Look at it this way. It's perfectly fine to manufacture and sell lead salts. It's not fine to use them as artificial sweeteners.
Roy Schestowitz
2010-02-19 10:10:36
Robotron 2084
2010-02-19 15:49:27
http://www.reuters.com/article/idUSTRE61I2OB20100219