Monday, April 28, 2014

Failure, amendment and a lesson to learn

“It's fine to celebrate success but it is more important to heed the lessons of failure.” We completely agree with the author of this quote, Microsoft cofounder Bill Gates. Cybercriminals do not give second chances, so it's essential to avoid repeating the same mistakes.

We bring you some examples of errors that we should not find again in the future. For example, the flaw discovered in Facebook’s servers which could be used by a cybercriminal to perpetrate DoS (Denial of Service) attacks against other websites, with a bandwidth of 800 Mbps.

Another perfect example, it would be the zero-day vulnerability discovered in all versions of Internet Explorer, from 6 to 11, last weekend.

But undoubtedly the security issue of the day comes precisely from a security company. Websense has recognized that an attacker could gain the credentials of other users in plain text due to a vulnerability in several of its products.

In part, such failures are some of those that allow criminals to bypass the defense lines of organization’s systems in order to steal sensitive information or make their online services inaccessible, such as it is perfectly explained by IBM on this video:


A way to prevent the reoccurrence of quite delicate security situations like the one caused by Heartbleed vulnerability a few weeks ago, is achieving a partnership between companies in the sector. In order to get everyone pushing in the same direction, the Linux Foundation has formed the CII (Core Infrastructure Initiative) consortium along with other major IT players such as Cisco, Dell, Facebook, Fujitsu, Google, Intel, Microsoft, NetApp, and VMware.

Another important method to overcome Internet security problems is pursuing those who harm other users. In this sense, the man at the head of a cybercrook gang, which managed to steal £ 1.25 million to a UK bank in one single day, has been condemned to five years and six months in prison.

What can you do as a user to be protected? It is imperative that you keep all your software updated at all times and armor your devices with security solutions. Also, you have to create strong passwords for your personal accounts, make regular backups of your important files and keep yourself informed of the latest developments in the world of cybersecurity, for example, through CIGTR’s social channels and here on our blog.

0 comments:

Post a Comment