Language Selection

English French German Italian Portuguese Spanish

Sysadmins taking brunt of blame

Filed under
Security

Sysadmins are taking a big chunk of the blame for the latest worm attacks on Windows - said to have already infected 250,000 machines.

An online poll by security company Sophos had revealed that 20 percent of businessmen feel that the man dealing with the problem - the system administrator - is most to blame, for not patching systems fast enough.

The only consolation is that 35 percent of the 1,000 people polled blame Microsoft for the attacks, and a surprisingly low 45 percent, the virus writers themselves.

The attacks exploit a weakness in the plug-and-play element of Windows 2000 to attempt to gain control of PCs.

"What is most surprising is that so many people blame Microsoft for having the software flaw in the first place. Many respondents appear to be incredibly frustrated by the constant need to roll-out emergency patches across their organisations," commented Graham Cluley of Sophos.

An unknown number of businesses around the world have been hit by worms attempting to exploit the vulnerability, including, embarrassingly, a number of well-known media outlets such as CNN, ABC and The New York Times.

Sophos said it had detected another five such worms in the past 12 hours, taking the total number known to attempt exploits to 17 in all.

This has all happened at a time when Microsoft would rather users moved away from Windows 2000, evens so far as to remove mainstream support from the OS on June 30th of this year. Despite its evident unpopularity inside Microsoft, a recent survey discovered the uncomfortable fact that half of corporates still use it widely, four years after the introduction of its supposed replacement, XP.

Another recent survey by Sophos discovered that only 28 percent of those polled rated Microsoft as their most trusted operating system. Forty-seven percent reckoned Linux and Unix were more secure.

By John E. Dunn
Techworld

More in Tux Machines

Google Fixed GHOST Exploit in Chrome OS in 2014 and Didn't Tell Anyone

Details about a GLIBC vulnerability were published a couple of days ago by a company called Qualys, and the distributions using it have already received patches. Now, it seems that Google knew about this problem, patched it in ChromeOS a year ago, and forgot to say anything to anyone. Read more

ESA implements open source based private cloud infrastructure

The European Space Agency (ESA) has implemented a private cloud infrastructure to offer IT services to its user communities. The datacentre in Frascati, Italy, is already operational, while a second datacentre in Darmstadt, Germany, has just been completed. Read more

Today in Techrights

A small note on window decorations

If you have updated to the recently released GNOME development version, you may have noticed that some window decorations look slightly different. Of course it is quite normal for the theme to evolve with the rest of GNOME, but in this case the visual changes are actually the result of some bigger changes under the hood which deserve some more explanation. It is well-known that GTK+ gained support for client-side decorations a while ago – after all, most GNOME applications were quick in adopting custom titlebars, which have become one of the most distinguished patterns of GNOME 3 applications. However it is less well-known that client-side decorations may also be used for windows with no custom decorations, namely when using GDK’s wayland backend. Read more