CSO - Most of the time, alarming reports about zero-day flaws and new security patches make me skeptical. But not when it comes to the attack against Google through a zero-day flaw in Internet Explorer (IE).
Hackers used a security hole in a browser famous for vulnerabilities to compromise the biggest search giant on the planet. In the process, a lot of other companies suffered. Here's how my colleague, Robert McMillan, described recent events in his article:
Microsoft is scrambling to patch an Internet Explorer flaw that was used to hack into Google's corporate networks last month. The attack was used to hack into networks at 34 companies, including Adobe, security experts say. Typically such hacks involve several such attacks, but the IE bug is the only one definitively linked to the hacking incident, which security experts say originated in China.
In a security advisory released Thursday, Microsoft said IE 6 users on Windows XP are most at risk from the flaw, but that other users could be affected by modified versions of the attack. Microsoft said it is developing a fix, but it did not say when it expects to patch the issue. The company is slated to release its next set of security updates on Feb. 9. A Google spokesman confirmed Thursday that the Internet Explorer attack was used against Google and that the company then reported the issue to Microsoft.
Google learned of the issue in December and, after discovering the server used to control the hacked computers, notified other companies affected by the hack. Apparently convinced that the infiltration was sanctioned by the Chinese government, Google has threatened to effectively pull its business out of China.
This column isn't about bashing Microsoft or Google. My opinion is that both companies have been fairly aggressive about security, especially Microsoft. Despite the best effort of companies, the bad guys still score big with increased frequency.
I do, however, see this as a big wake-up call for all of us.
In past columns, I've taken security vendors and PR agencies to task for putting out alarmist alerts for every vulnerability that rolls around the pike. My reasoning has been based on history. When I was reporting on Patch Tuesday each month in my previous job, my e-mail inbox would start clogging by 10 a.m. with messages from PR reps eager to get me on the phone with one of their clients to discuss the latest cause for alarm. Then I'd get on the phone with the vendors and hear pretty much the same grim scenario -- regardless of the flaw -- that I heard the month before. Most of the time, the warnings were not followed by the big attack. Then I'd get on the phone with IT security administrators who wouldn't be feeling the alarm coming from the outside.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts