[Sites often get hacked simply because they present an opportunity for vandalism and not because they espouse any ideology or cause that an attacker may oppose, said Ira Winkler, president of the Internet Security Advisors Group in Severna Park, Md., and author of a book called Corporate Espionage.] To a hacker, you're just an IP address, ... You get hit because you let yourself be an easy mark. |
For banks, their number one is protecting the impression of trust. If they lose that impression of trust, that bank goes out of business. It's that simple. |
I used to say there were only ... a few hundred (in the latter category). These are people who like to play with software and figure out how to find exploits into the software. That requires lots of good technical talent and knowing how to do software testing. |
I'm not going to say Macintosh is as inherently buggy as Windows was about five years ago. But the holiday is over. |
The fact is, you can get lost in the statistics, and I think a lot of people will be surprised by the Linux vulnerability numbers. But it's impossible to write perfectly secure software that's also functional. |
The more functionality you have, the more likelihood there is for a security vulnerability, and Windows NT just keeps building more and more functionality in there. |
These are not your average hackers. They're highly skilled people who try to find holes in commercial software. |
They're the ones finding the latest hack for the Web, instead of finding the latest hack on the Web, ... There's a big difference. |
This one, from a technical standpoint, isn't dangerous in and of itself. What makes it dangerous is that it can spread very, very rapidly and fill up mail servers, causing mail servers around the world to crash. |
To a hacker, you're just an IP address. You get hit because you let yourself be an easy mark. |
To a large extent, this could be a failure with open source. |
Traditional systems are meant more to protect their dollar invested in making sure they deny unauthorized users access because that saves them money, |
When the security manager found out, he went through the roof. |
When you buy their product, you have to register with it. They make you register with it in order to use the product .... They should be responsible for when there's a security-related problem for e-mailing everybody that registered that product and let them know. |
With free e-mail, the more accesses there are, the more money they potentially make from advertising sales, so they don't put that much thought into the design of the system for security. |