IT-oriented publications often warn of threats to your systems and data. In recent years, the popular press has picked up on this topic, particularly highlighting threats with memorable names. A few recent examples:
Fantastic threats grab the reader’s attention, especially when accompanied by clever graphics.
As one might expect, threats that capture the attention of the news media are just the tip of the threat iceberg. To put these few into perspective, consider that the AV-TEST Institute registers over 250,000 malicious programs every day.
In general, these threats exploit flaws in the implementation of security mechanisms or weaknesses in older communications protocols, such as SSL. The most fantastic of the threats require a precise set of uncommon conditions on the victim’s network and servers before they have a chance to succeed. The more dangerous threats count on exploiting well-known security holes in unpatched systems.
You can find fantastic threats all around you:
Despite new malware appearing every few seconds, you can fight threats – both fantastic and ordinary – with proactive security practices such as these:
Fantastic threats don’t have to lead to fantastic security breaches!