Language Selection

English French German Italian Portuguese Spanish

Sysadmins taking brunt of blame

Filed under
Security

Sysadmins are taking a big chunk of the blame for the latest worm attacks on Windows - said to have already infected 250,000 machines.

An online poll by security company Sophos had revealed that 20 percent of businessmen feel that the man dealing with the problem - the system administrator - is most to blame, for not patching systems fast enough.

The only consolation is that 35 percent of the 1,000 people polled blame Microsoft for the attacks, and a surprisingly low 45 percent, the virus writers themselves.

The attacks exploit a weakness in the plug-and-play element of Windows 2000 to attempt to gain control of PCs.

"What is most surprising is that so many people blame Microsoft for having the software flaw in the first place. Many respondents appear to be incredibly frustrated by the constant need to roll-out emergency patches across their organisations," commented Graham Cluley of Sophos.

An unknown number of businesses around the world have been hit by worms attempting to exploit the vulnerability, including, embarrassingly, a number of well-known media outlets such as CNN, ABC and The New York Times.

Sophos said it had detected another five such worms in the past 12 hours, taking the total number known to attempt exploits to 17 in all.

This has all happened at a time when Microsoft would rather users moved away from Windows 2000, evens so far as to remove mainstream support from the OS on June 30th of this year. Despite its evident unpopularity inside Microsoft, a recent survey discovered the uncomfortable fact that half of corporates still use it widely, four years after the introduction of its supposed replacement, XP.

Another recent survey by Sophos discovered that only 28 percent of those polled rated Microsoft as their most trusted operating system. Forty-seven percent reckoned Linux and Unix were more secure.

By John E. Dunn
Techworld

More in Tux Machines

today's leftovers

Proposed: A Tainted Performance State For The Linux Kernel

Similar to the kernel states of having a tainted kernel for using binary blob kernel modules or unsigned modules, a new tainting method has been proposed for warning the user about potentially adverse kernel performance. Dave Hansen of Intel has proposed a new "TAINT_PERFORMANCE" for the kernel that would proactively print a warning message about not using the kernel for any performance measurements. Dave explained in his RFC announcement, "I have more than once myself been the victim of an accidentally-enabled kernel configuration option being mistaken for a true performance problem. I'm sure I've also taken profiles or performance measurements and assumed they were real-world when really I was measuring the performance with an option that nobody turns on in production. A warning like this late in boot will help remind folks when these kinds of things are enabled." Read more

Scientific Linux 7.0 x86_64 BETA 3

Fermilab's intention is to continue the development and support of Scientific Linux and refine its focus as an operating system for scientific computing. Today we are announcing a beta release of Scientific Linux 7. We continue to develop a stable process for generating and distributing Scientific Linux, with the intent that Scientific Linux remains the same high quality operating system the community has come to expect. Please do not install Pre-Release software in your production environment. Read more

Ubuntu 14.10 (Utopic Unicorn) Now Features Linux Kernel 3.16.1

"The Utopic kernel has been rebased to the first v3.16.1 upstream stable kernel and uploaded to the archive, ie. linux-3.16.0-9.14. Please test and let us know your results," says Canonical's Joseph Salisbury, after the latest Ubuntu Kernel Team meeting. Read more