Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Fighting Content Threats


  • Please log in to reply
2 replies to this topic

#1 KoanYorel

KoanYorel

    Bleepin' Conundrum


  • Members
  • 19,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:65 miles due East of the "Logic Free Zone", in Md, USA
  • Local time:01:48 AM

Posted 26 November 2004 - 02:51 PM

Ken Xie of Fortinet on Fighting Content ThreatsBy Elizabeth Millard, TechNewsWorld, 11/25/04 5:00 AM PT "Integrating independent security systems together and keeping them all up-to-date and able to coordinate their actions in the face of a fast-moving attack is a daunting if not intractable task," Fortinet CEO Ken Xie told ECT News. "To deal with today's and tomorrow's blended threats requires a more integrated, holistic approach to security." From the Sasser worms to phishing attacks, the Internet has been crawling with malware this year. Fortunately, there are people like Ken Xie who are ready to fight the good fight. As founder, president and CEO of network-protection firm Fortinet, Xie has seen more than his share of the techno-enemy. In an exclusive interview with ECT News, Xie talked about the threats that still remain and what can be done in the battle against the bad guys.
The only easy day was yesterday.

...some do, some don't; some will, some won't (WR)

BC AdBot (Login to Remove)

 


#2 phawgg

phawgg

    Learning Daily


  • Members
  • 4,543 posts
  • OFFLINE
  •  
  • Location:Washington State, USA
  • Local time:09:48 PM

Posted 27 November 2004 - 07:28 PM

"Even more insidious are so-called browser-based attacks that don't require any action on the part of the user other than going to a particular Web page to become infected. HTML code can deliver JavaScripts and other executable code that activates automatically without user action once they navigate to a particular page. This method can be extremely effective for distributing Trojans to unsuspecting users that can later allow access to a machine by a hacker." A statement from the article makes me wonder what the percentage of problems we deal with here on a daily basis involved this particular kinda trick. :thumbsup:
patiently patrolling, plenty of persisant pests n' problems ...

#3 JEservices

JEservices

    helping hand


  • Members
  • 1,700 posts
  • OFFLINE
  •  
  • Location:Texas
  • Local time:11:48 PM

Posted 27 November 2004 - 10:59 PM

That is interesting way to look at it, Phawgg.
We are all curious like a cat. We wonder, we ask, we learn.
Please post back when a suggestion works, so that others may learn.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users