New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 990
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image crkatk: Interviews: Virus-writing hackers are biggest threat image
Crack Attack
Virus-writing hackers are biggest threat
Andy McCue
silicon.com

Hackers who crossover into virus writing territory present the biggest danger to corporate computer systems as they perfect the 'blended threat' seen in recent virus outbreaks such as Sobig. That's the assertion of Sarah Gordon, senior research fellow at Symantec Security Response, who has worked with the White House and the FBI to research the psychological profile of hackers and virus writers.

Gordon told silicon.com that hackers are driven by the motivation to complete a technology challenge and are usually not interested in the basic task of writing viruses and worms.

There are people in the virus writing community who hack and people in the hacking community who write viruses but for the most part they are very separate communities. The virus writers are seen at the lower end of the food chain, she said.

But Gordon warned that creating a virus such as Sobig or Bugbear, only with much more damaging payloads, is well within the capabilities of even the most inexperienced hacker.

Many of the threats are the result of the crossover between hackers and virus writers. Erasing a hard drive is a couple of key strokes. It isn't rocket science. A hacker of any skill level could write a self-replicating program but most find it too boring, she said.

And it seems the traditional stereotype of a spotty teenager hacking away in a dark bedroom is nothing more than a myth from the movies.

The population is diverse. It just takes the ability to manipulate a computer system. It is not guys sat in a basement with piercings everywhere. It could be the 50-year-old accountant because she is bored, or the boss' 15-year-old daughter, or your 9-year-old nephew, she said.

There is also a distinct difference between hackers and virus writers, according to Gordon's research.

Virus writers have normal relationships with peers and families. Hackers tend to be more introverted. Hacking is a very personal thing. One is power and control and the other is letting go.

Although Gordon works for a security software company, she says 'ethics' education at an early age would help prevent children and teenagers using their computer knowledge to cause damage.

One thing that is important is introducing ethics in technology at an early age. On the computer there is less context and security. Teaching them that there's a person on the end of that modem is important, she said.



Copyright © 2003 CNET Networks, Inc. All Rights Reserved.
silicon.com is a registered service mark of CNET Networks, Inc.
silicon.com Logo is a service mark of CNET NETWORKS, Inc.

Silicon.com
Posted on Monday, 03 November 2003 @ 05:05:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· C|Net News
· More about Crack Attack
· News by phoenix22


Most read story about Crack Attack:
Beware Attacker from IP 200.55.7.235 and Whole 200.x.x.x Block

image
Article Rating
Average Score: 4
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register