WannaCry Ransomware: It might seem unbelievable that we are still discovering security gaps in software that has been used for decades. Most of us can expect that, at least for a software that uses hundreds of millions of people every day, errors should be detected and corrected.
But the chaos caused by the WannaCry ransomware last week shows how difficult it is to ensure that even in the most used software, things will not go wrong and even on a large scale.
This is because software is rarely designed or written in isolation. Sometimes developers rely on old code written by others and connect it to other systems that may not even have been built. THE codes is often written hastily by developers who intend to fix it later. And just as business priorities change, so too should the form of coding, whether we are referring to the coding languages used or the way projects are managed.
Instead of pursuing perfection, growth software it is more often a compromise. Consider an office building in the middle of a busy city: it might have to be built over old sewers and underground railroad tracks. The project manager is hoping that the basement won't start flooding, or worse, that the foundation won't rot and the building collapse.
This does not mean that software companies should abandon: the importance of robust code and secure software can be increased by using it from automotive to medical equipment.
But writing now and fixing it later does not seem to be an option anymore. It may be about an irrelevant software, but it is not for developers who develop critical systems that we rely on everyday.
But others who are not developers should recognize the importance of creating and maintaining software security by rewarding companies that set these standards as a priority.
Θα πρέπει επίσης να αναγνωρίσουμε ότι το λογισμικό αναπόφευκτα θα μας αφήσει "ξεκρέμαστους" περιστασιακά. Αυτό μπορεί να αφορά την υποστήριξη των συστημάτων και των data but also prepare for the worst. It also means that we should better understand the risks we face.
Too many events allowed WannaCry to be so aggressive (leaks of CIA hacking tools, vulnerabilities in older Windows, unrecognized systems).
All the signs (see the leaks WikiLeaks που αφορούν περισσότερα εργαλεία της CIA) δείχνουν ότι θα ακολουθήσουν περισσότερες "καταιγίδες", ίσως και μεγαλύτερες από την τελευταία.
Έρχονται περισσότερα "WannaCry", και αυτό θα γίνει σύντομα, οπότε ετοιμαστείτε.