Do you have to trust your security software?

Here at iGuRu.gr we often mention that there is no security on the internet and of course there are many who agree. Companies spend billions of dollars every year to buy up-to-date security products, but cyber attacks and data breaches do not stop. Recently, "reliable security tools" were discovered that contained vulnerabilities!

Google's Project Zero recently uncovered a slew of critical vulnerabilities in two security products used by dozens of businesses and consumers from Symantec and its commercial norton.

The vulnerabilities allowed hackers to gain complete control over computers using the applications by sending emails that serve malicious self-replicating code over networks, even if those messages are never opened and no one clicks on them. containing, according to the researcher Tavis Ormandy of Google's Project Zero.security key

Ο Ormandy has previously discovered security holes in high security business security products such as: Kaspersky, FireEye, ESET, Comodo, McAfee, and Trend Micro.

As you can see from above, we have reached a time when it is impossible to trust products that are supposed to keep our data safe. The security industry that has been set up seems to be facing serious problems with omissions that endanger its customers.

Of course, suppliers to date do not seem to be accountable, although they should be held accountable for the security vulnerabilities found in their products that put their customers at risk. It is a different problem if the products they sell do not recognize a threat and completely different when the products they sell in the market provide a "window" of access to the attackers.

Mr. Ormandy rightly states that security software should take advantage of techniques such as sandboxing that can help control the activities of malicious code. And they should all have a specific development lifecycle with security best practices, such as those pioneered by Microsoft and Cigital. Vendors should also look for vulnerabilities in their product design that can be used by attackers to legitimately exploit or functions to compromise systems. Suppliers should prioritize security in their products and there should be no excuse for not doing so.

But when vulnerabilities are found, the patch does not last long. Spam in the media keeps little, and some lawsuits or law changes should be made to make things better.

After all the above: How can you protect yourself? You should probably minimize your exposure online by better adapting your mindset. So it is rather a question of having realistic expectations.

Do not assume that the security products are safe

Companies should implement security policies on all security tools they use. This means that they should require vendors to provide automated repairs, in-depth examination of their infrastructures and pen-testing on all security products.

Assume your network will be compromised

Even when the security products you use work as advertised, that doesn't mean they catch all threats. The online community and companies should prepare for the possibility s (which is increasingly a reality).

Traditional antivirus products that control systems by identifying specific malware signatures when signatures change (something that happens constantly), malware is not recognized.

Responsibility

The security industry is responsible for promising security, to make sure that the sold security products not only work as they should but also do not endanger the end user by sparing backdoors to the hackers.

And the utopia

Security vendors should act as standards for the entire technology industry by developing secure software to restore customer loyalty.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).