Subscribe via feed.

Top five urban myths in the IT security business

Posted by deepquest on November 5, 2010 – 2:28 am

The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its community, mainly through Facebook and Twitter, which myths come to mind when talking about antivirus companies, and below we look at the top five answers.

1.    Antivirus security companies make the viruses. This is a claim we have often heard at Panda Security throughout our 20 years in the business, and no doubt the same goes for other companies in the sector. The claim is absurd, particularly if you think that we receive around 55,000 new viruses every day. What’s more if it were true, such a scandal would surely have been uncovered in the 20 or more years that the sector has been protecting users.

2.    Security companies hire hackers. Of course we can’t speak on behalf of the entire industry, but at Panda Security this issue has been a concern for us and we have never knowingly contracted ‘black hat’ hackers. We have however hired -and we are always looking out for- ‘white hat’ (basically, the good guys) hackers. Another variation of this myth is that you have to be an IT engineer to work in IT security, which is also false. The profile of those who work at Panda is highly varied: engineers, mathematicians, physicists, self-taught, etc.

3.    There are no viruses for Mac, Linux or cell phone platforms. We would all like this to be true! It is commonly held that none of these present any risks to users, as viruses are only designed for Windows platforms. The truth is that there are viruses for all these platforms. The difference lies in the amount of threats circulating in comparison with those designed for Windows. The explanation is simple: hackers are looking for profit. If the aim is to reach as many people as possible and consequently more potential victims to steal from, what is the best target? A platform with 10 million users or one with 500 million? The answer is obvious.

4.    It requires considerable knowledge to be a hacker, develop viruses, infiltrate systems… in some cases yes, in others no. Some years ago it was difficult to develop viruses, worms, Trojans, etc., and it required technical know-how. In fact many hackers started out “just messing around” while they learnt, and acquired significant knowledge of programming languages, communication protocols, etc. Today this is no longer necessary, as in the case we witnessed recently with Operation Mariposa, those responsible had quite limited knowledge. This is because kits are sold across the Internet which enables amateur hackers to generate and configure malware. We wouldn’t quite say that anyone can do it, but with a little bit of knowledge and dedication, it’s possible to construct, for example, a botnet capable of infecting 13 million computers around the world.

5.    Women don’t work in security companies. This assumption is as frequent as it is untrue. At Panda Security the truth is quite different: more than 30% of the workforce is female, and many women are working in technical or management areas. This figure is growing, as an increasing amount of women are training for sectors such as IT security.

from Panda Security

Tags: ,
This post is under “Security” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.