I remember that journalist's name:

That's a blast from the past regarding accuracy in tech journalism:

http://www.usatoday.com/money/industries/technology/2004-11-29-honeypot_x.htm

In that story that was written up they failed to mention that in their study that they took a SBS box, one nic, netbios ports obviously exposed, and set up the system with the password of password (which if you followed the "wizardized" setup to that SBS box, not only does it warn you not to set up a box without a hardware firewall if you have one nic, but it prompts you twice during the setup to select a proper password and if you've selected a rotten one, it warns you about that too, thus to get the box in that condition, you'd have to really NOT READ. Granted in the tech industry there is a reputation of not reading, but a normal person would have to be really blind not to miss all the times a typcial SBS box wants to make sure you aren't as stupid as they set this box up.

Is any of that in that article? Uh no...it's not. And I'm actually surprised that the SBS box with one nic, netbios exposed and an Administrator account of "password" stood up as long as it did. That's like standing in the middle of the diamond lane on the 405 freeway at 7:30 a.m Monday morning and getting surprised that a car drove over you.

I'll see if I can find his email address in my archives because I found his email address searching on the web and pinged him. My memory is a bit rusty...I could be wrong, but I don't remember hundreds of thousands being bantered around back then as the infection number either. In fact I'm not sure I remember 'infections" being bantered about .. I remember infected web site numbers being debated though.

Symantec Security Response - Bloodhound.Exploit.56:
http://www.symantec.com/avcenter/venc/data/bloodhound.exploit.56.html
Exploit-WMF:
http://vil.mcafeesecurity.com/vil/content/v_137760.htm
US-CERT Vulnerability Note VU#181038:
http://www.kb.cert.org/vuls/id/181038

There seemed to be hundreds of thousands of security experts freaking us out during the WMF issue.....that's more of what I remember....


Murad Talukdar wrote:

Valid points being made by everyone here--and I'm glad that this list is
finally seeing some action to rival the basics list!
Just going back to one of my original issues: Can anyone verify statements
like this from USA Today?
"In December, cybercrooks moved quickly to exploit a similar Internet
Explorer flaw, hijacking hundreds of thousands of PCs before Microsoft made
a patch available. The emergence of zero-day threats has raised complex
dilemmas for the world's largest software maker."
Hundreds of thousands?

Link here
http://www.usatoday.com/tech/news/computersecurity/2006-03-30-microsoft-secu
rity_x.htm

Where are these numbers coming from? I would like some sources quoted here I
guess. I'm sure that honeynets etc give some estimates of what's going on
and how many sites etc are out there exploiting these flaws. Microsoft has a
scheme running too, doesn't it? Honeymonkey?
I'm trying to get an email address for the reporter, Byron Acohido.



Regards
Murad Talukdar







--
Letting your vendors set your risk analysis these days? http://www.threatcode.com


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to