{"id":978,"date":"2010-11-05T02:28:04","date_gmt":"2010-11-04T19:28:04","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=978"},"modified":"2010-11-05T02:35:28","modified_gmt":"2010-11-04T19:35:28","slug":"top-five-urban-myths-in-the-it-security-business","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2010\/11\/top-five-urban-myths-in-the-it-security-business\/","title":{"rendered":"Top five urban myths in the IT security business"},"content":{"rendered":"<p><span style=\"font-weight: normal;\">The IT security industry is no stranger to urban myths: stories that  spread and, over time, become accepted as general truths. Global IT  vendor Panda Security has been asking its community, mainly through  Facebook and Twitter, which myths come to mind when talking about  antivirus companies, and below we look at the top five answers.<\/span><\/p>\n<p><span style=\"font-weight: normal;\"><!--more--><\/span><\/p>\n<p><span style=\"font-weight: normal;\">1.\u00a0\u00a0 \u00a0Antivirus security companies make the viruses. This is a  claim we have often heard at Panda Security throughout our 20 years in  the business, and no doubt the same goes for other companies in the  sector. The claim is absurd, particularly if you think that we receive  around 55,000 new viruses every day. What\u2019s more if it were true, such a  scandal would surely have been uncovered in the 20 or more years that  the sector has been protecting users.<\/span><\/p>\n<p><span style=\"font-weight: normal;\">2.\u00a0\u00a0 \u00a0Security companies hire hackers. Of course we can\u2019t speak on  behalf of the entire industry, but at Panda Security this issue has been  a concern for us and we have never knowingly contracted \u2018black hat\u2019  hackers. We have however hired -and we are always looking out for-  \u2018white hat\u2019 (basically, the good guys) hackers. Another variation of  this myth is that you have to be an IT engineer to work in IT security,  which is also false. The profile of those who work at Panda is highly  varied: engineers, mathematicians, physicists, self-taught, etc.<\/span><\/p>\n<p><span style=\"font-weight: normal;\">3.\u00a0\u00a0 \u00a0There are no viruses for Mac, Linux or cell phone platforms. We  would all like this to be true! It is commonly held that none of these  present any risks to users, as viruses are only designed for Windows  platforms. The truth is that there are viruses for all these platforms.  The difference lies in the amount of threats circulating in comparison  with those designed for Windows. The explanation is simple: hackers are  looking for profit. If the aim is to reach as many people as possible  and consequently more potential victims to steal from, what is the best  target? A platform with 10 million users or one with 500 million? The  answer is obvious.<\/span><\/p>\n<p><span style=\"font-weight: normal;\">4.\u00a0\u00a0 \u00a0It requires considerable knowledge to be a hacker, develop  viruses, infiltrate systems\u2026 in some cases yes, in others no. Some years  ago it was difficult to develop viruses, worms, Trojans, etc., and it  required technical know-how. In fact many hackers started out \u201cjust  messing around\u201d while they learnt, and acquired significant knowledge of  programming languages, communication protocols, etc. Today this is no  longer necessary, as in the case we witnessed recently with Operation  Mariposa, those responsible had quite limited knowledge. This is because  kits are sold across the Internet which enables amateur hackers to  generate and configure malware. We wouldn\u2019t quite say that anyone can do  it, but with a little bit of knowledge and dedication, it\u2019s possible to  construct, for example, a botnet capable of infecting 13 million  computers around the world.<\/span><\/p>\n<p><span style=\"font-weight: normal;\">5.\u00a0\u00a0 \u00a0Women don\u2019t work in security companies. This assumption is as  frequent as it is untrue. At Panda Security the truth is quite  different: more than 30% of the workforce is female, and many women are  working in technical or management areas. This figure is growing, as an  increasing amount of women are training for sectors such as IT security.<\/span><\/p>\n<p><span style=\"font-weight: normal;\">from <a href=\"http:\/\/pandalabs.pandasecurity.com\/deconstructing-the-urban-myths-in-the-it-security-sector\/\" target=\"_blank\">Panda Security<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[163,2866],"class_list":["post-978","post","type-post","status-publish","format-standard","hentry","category-security","tag-myths","tag-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-fM","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=978"}],"version-history":[{"count":3,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/978\/revisions"}],"predecessor-version":[{"id":980,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/978\/revisions\/980"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}