iTnews
  • Home
  • News
  • Technology
  • Security

Vulnerability-to-worm cycle shortens to 10 days

By Marcia Savage on May 20, 2004 9:30PM

The vulnerability-to-worm cycle has shortened from 288 days in 1999 to 10 days this year, Foundstone analysts said in a report released earlier this week.

The security firm's analysis focused on major computer worms between 1999 and 2004, including Melissa, Code Red, Nimda, SQL Slammer, and Sasser.

Worms that required user interaction, such as opening attachments, and remotely controlled "bots" were not included in the trend report in order to focus solely on automated threats, Foundstone said.

The trend puts pressure on IT departments to fix vulnerabilities faster than ever, Stuart McClure, Foundstone president and CTO, said in a prepared statement.

"The window within which the good guys have to work is closing fast," he said.

www.foundstone.com

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
10cycledayssecurityshortenstovulnerabilitytoworm

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Marcia Savage
May 20 2004
9:30PM
0 Comments

Related Articles

  • Collins Foods puts IT focus on security controls, cloud services
  • OpenSSL subject to remote memory corruption
  • Origin Energy goes public with bug bounty program
  • ACCC starts review of Google's Mandiant buyout
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

NSW Police scores $100m to connect body-cams to firearms, tasers

NSW Police scores $100m to connect body-cams to firearms, tasers

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.