Cisco CSO Says Antivirus Money "Completely Wasted" 503
mernil writes with an excerpt that kicks off a story at ZDNet Australia: "Companies are wasting money on security processes — such as applying patches and using antivirus software — which just don't work, according to Cisco's chief security officer John Stewart. Speaking at the AusCERT 2008 conference in the Gold Coast yesterday, Stewart said the malware industry is moving faster than the security industry, making it impossible for users to remain secure."
Re:Agreed -Free For Personal Use (Score:5, Informative)
Re:Quick linux question (Score:2, Informative)
Disagree (Score:5, Informative)
Additionally, patching isn't just about security. It's about fixing software bugs that could cost you time/money later.
Duh! (Score:3, Informative)
Anti-virus software is by its very nature a "post damage" measure, like closing the barn door after the horses leave. Of fixing the roof after the house is wrecked from rain.
The *only* way to prevent viruses is to understand that your computer only does what it is told and you need to control who gets to tell it what to do.
Windows, and we are talking about Windows here, is designed to allow foreign agents to control your system without your consent. Microsoft has so many holes in its system beyond just stack overflow exploits, but protocols and APIs designed to make it "easier" for application to do things "for you," and are we surprised that it is exploited?
Re:Stating the obvious.. (Score:5, Informative)
I generally agree with your sentiment, although I feel compelled to correct one of your points...
The previous Slashdot article didn't say 66% of all PC's, it said 66% of all PC's (over $1000) sold in retail. That's still impressive for Apple and shows a lot of growth potential as it expands its retail presence, but it's a very different market than 66% of all PC's.
Re:Problem of assessing success... (Score:3, Informative)
Viable alternative. (Score:5, Informative)
Re:Cure the viri (Score:1, Informative)
* http://www.sophos.com/pressoffice/news/articles/2006/02/macosxleap.html [sophos.com]
* http://www.sophos.com/pressoffice/news/articles/2007/11/mac-osx-trojan.html [sophos.com]
* http://www.sophos.com/pressoffice/news/articles/2006/02/macpoll.html [sophos.com]
"Mac users cannot keep thinking that they are invulnerable to these threats." -- Graham Cluley
Gonna make any other jackass statements?
Re:Stating the obvious.. (Score:4, Informative)
Re:Agreed (Score:5, Informative)
Re:Stating the obvious.. (Score:5, Informative)
This is not the case with Mac OS X. My current account has administrator privileges, but they are inactive by default. I have to enter my password in order to elevate to admin permission, and such elevation applies only to the program which requested the change. This makes an attack both less likely and easier to defend against, as the program can't just silently go in and modify my applications -- it has to at least ask for permission first.
Obviously there are still dangers. My user files are still vulnerable to attack at all times, but of course Time Machine means I have backups of my files going back weeks. There is also the danger that a program could trick me into entering my password when its try intentions are nefarious, thereby getting the required permission to trash my computer. The only way to defend against that is to be very careful about when and where I enter my admin password, but that's true of any OS.
Re:Agreed (Score:5, Informative)
Re:Agreed (Score:1, Informative)
Re:Agreed (Score:2, Informative)