Black Hat: Hit spyware by punishing purveyors, experts say
Some users want to see them in jail
Computerworld - LAS VEGAS -- With spyware a continuing plague for many computer users, some experts and IT workers are calling for stiffer penalties -- including jail time -- for convicted spyware purveyors.
At a panel discussion yesterday during the Black Hat security conference here, speakers said that antispyware vendors are losing the fight against spyware creators, making more drastic measures necessary.
"It's not technically feasible to stop spyware," said Dan Kaminsky, an independent security consultant. "Think of the millions of PCs that have either been put away for good, sent away for service or replaced because of spyware infections. That is probably hundreds of millions or billions of dollars worth of damage. Yet no one has gone to jail; no one has been sued."
Recent statistics gathered by antispyware vendor Webroot Software Inc. point to spyware's continued growth. Between March and June, more than 100,000 new Web sites hosting spyware were discovered by Webroot. That's in addition to the 427,000 such sites discovered by Webroot since it began searching for them in January 2004 using a specially tuned search engine that Gerhard Eschelbeck, chief technology officer of Webroot, calls a "Google for spyware."
"Viruses are pretty easy to track -- you just stick out the sensor," Eschelbeck said. "Spyware is pretty hard to track down. You've got to actively hunt it down because it changes every day, every hour."
According to Webroot, 31% of all PCs -- including those that are business-owned -- have been infected with Trojan horses, which typically arrive disguised as something innocuous, such as a picture or document. An infected PC at an enterprise is host to an average of 1.3 Trojans, which Webroot considers the worst form of spyware -- although they can be more malicious than that.
Pamela Fusco, an information security manager at an East Coast financial services company, said her team deals with spyware infections every day. The worst incident was spyware that began replicating so quickly that "in 20 seconds it nearly took down our Microsoft Exchange system," she said.
That is despite a comprehensive program Fusco set up for dealing with spyware, including antispyware technology from McAfee Inc. and help from Web application security firm SPI Dynamics Inc.; constant PC audits; a global alert system; restrictions on the use of PCs for employees who don't need full access; and education programs involving live demonstrations or Web video. Another tactic enterprises should adopt includes closely monitoring their Domain Name System logs, said Kaminsky.
And Drew Maness, senior security strategist at The Walt Disney Co., suggested that IT help desk workers be trained to diagnose PCs that are running abnormally slow as possible hosts for spyware.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts