Feeds

Unpatched Windows PCs own3d in less than four minutes

Gone in 240 seconds

Combat fraud and increase customer satisfaction

An unpatched PC is likely to last just four minutes on the internet before being attacked and compromised.

The time it takes for a PC to get itself owned varies by operating system and what activities a user engages in - but even allowing for this, putting an unpatched Windows PC directly onto the net in the hope that it downloads patches faster than it gets exploited give you "odds that you wouldn't bet on in Vegas", warns Lorna Hutcheson, a researcher at the SANS Institute's Internet Storm Centre (ISC).

The ISC maintains a survival time graph that gives an indication of how long a system might last on the internet before stumbling into the crosshairs of hackers, who routinely use automated tools to scan and commandeer vulnerable systems. Survival time, the ISC notes, has dropped markedly over the last two years, and is currently a fairly scary four minutes.

Security experts advise using a NAT (network address translation router) and personal firewall before connecting systems to the net on anything outside sacrificial systems. This best practice can create tensions between management, who want new systems up and running as quickly as possible, and security admins.

"More than once, I've dealt with a compromise of a system that was placed on the network before it was hardened," Hutcheson writes. "I got the same answer every time - 'We needed it working ASAP'. However, more time was spent playing clean up from it than if it was just done right the first time."

Thorsten Holz, of the German Honeynet Project, explains how exploits lead to system compromises. His analysis - complete with statistics and graphs - can be found here. ®

SANS - Survey on application security programs

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.