Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Botnet Security Worms

Ask Slashdot: Who's Going To Win the Malware Arms Race? 155

An anonymous reader writes: We've been in a malware arms race since the 1990s. Malicious hackers keep building new viruses, worms, and trojan horses, while security vendors keep building better detection and removal algorithms to stop them. Botnets are becoming more powerful, and phishing techniques are always improving — but so are the mitigation strategies. There's been some back and forth, but it seems like the arms race has been pretty balanced, so far. My question: will the balance continue, or is one side likely to take the upper hand over the next decade or two? Which side is going to win? Do you imagine an internet, 20 years from now, where we don't have to worry about what links we click or what attachments we open? Or is it the other way around, with threats so hard to block and DDoS attacks so rampant that the internet of the future is not as useful as it is now?
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Who's Going To Win the Malware Arms Race?

Comments Filter:
  • More of the same (Score:5, Insightful)

    by gsslay ( 807818 ) on Tuesday March 31, 2015 @05:19AM (#49377777)

    No-one will "win", and it's not helpful to represent the issue as if it's "winnable" by either side.

    Malware, viruses, trojans and other malicious behaviour of yet unheard methods will always be around, and we'll always be inventing new ways of counteracting them. Which will in turn be circumvented, and so it goes on.

    • by fuzzyfuzzyfungus ( 1223518 ) on Tuesday March 31, 2015 @05:33AM (#49377813) Journal
      I'd be inclined to suggest that it will be worse than that:

      Barring some sort of radical change in priorities that causes the market to accept zero new features for, oh, a (human) generation or more, while vendors put out bugfix releases, 'winning' certainly isn't going to happen by doing conventional stuff; but harder.

      If 'winning' in fact occurs, odds are excellent that it will be on some wonderfully dystopian lockdown platform that shrinks the problem space considerably by forbidding basically everything that hasn't been cryptopgraphically blessed by the vendor, sandboxed to hell and back, or both. Naturally, the power afforded to the vendor in this scenario will never be abused.
      • The future is now. (Score:5, Insightful)

        by duckintheface ( 710137 ) on Tuesday March 31, 2015 @06:03AM (#49377871)

        You can already see the shape of that future in Google's Chrome OS. This is a very much "locked down" combination of operating system, browser, cloud applications, and storage. Security updates are automatic and (eventually) involuntary. You are limited to running the software that Google allows you to run, most of which is executed on Google servers. No website Java programs are allowed at all.

        Such an architecture provides for maximum security and has the advantage of minimum hardware requirements for ram memory and on-machine storage. It allows for encryption of all communications between your computer and the outside world with mimimum involvement or decison making by the user. And from Google's point of view it represents the perfect vehicle for advertizing in a controlled enviornment. In a sense, your computer has already been hacked (by Google) when you buy it. And they will make sure it stays hacked to their preferences.

        The next step will be integration of the computer operating system with the phone operating environment. The two will merge with more software coming from "app stores" and not from the wild. At the same time, the services on the computer will become more integrated with each other so that social media, calendar, voice calls, texting, and social media work togerther and don't work at all with outside software. It becomes a secure walled garden with enough internal features and flexibility to be tolerable to the mass users who are not or can not be responsible for their own security.

        • by Anonymous Coward on Tuesday March 31, 2015 @06:28AM (#49377941)

          That model (locked down like ChromeOS or iOS) is already succeeding in the marketplace over more traditional computing models, because it's what most people want. It's safer for them, and they want their devices to "just work".

          It's the inevitable end result. Except for some techies, almost everybody I know just wants to surf the web and send pictures to their friends and have that "just work". They have almost all given up on Windows in favor of mobile OSs for 99% of what they do. They sometimes still "have a PC", but don't use it much out of fear of malware, where they feel free to use the tablet, which has the side benefit of a much simpler interface for them.

          Market pressure will drive this.

          • but don't use it much out of fear of malware

            Actually, I think that they don't use their PC much because it's slow, clunky, and doesn't work very well. The number one complaint I hear from those forced to use Windows is that it takes forever to boot.

            Not that malware might not be number one if users had a clearer understanding of what it is.

            • by Marginal Coward ( 3557951 ) on Tuesday March 31, 2015 @09:19AM (#49378567)

              The number one complaint I hear from those forced to use Windows is that it takes forever to boot.

              As one who uses Windows voluntarily, it's hard for me to relate to this. I typically boot it once a day (after turning it off the previous night), so it's no hardship to spend the couple of minutes it takes to boot on some other part of my morning routine.

              My Android phone may be faster to boot than Windows, though I typically leave it on all the time since it doesn't use enough power to bother with turning it off at night. When I do restart it though, the process seems "slow". I think the reason is that I don't have cereal that needs eating or teeth that need brushing at those times.

              So where's the hardship in waiting for Windows to boot? It ain't perfect, but boot time would be pretty far down on my own list of Windows complaints.

            • I guess a 10 second boot time is long by some standard. There isn't one PC at my work place that takes more than 20 seconds to be ready to work on. I only hear that excuse from bad IT people or IT people with little to no budget which means they are stuck with 7 year old PCs or even Macs. Blaming the OS or the hardware is often just an excuse for laziness.

              Any poor integration of any type of hardware or software will always get this kind of response from it's users.

              Malicious software and attacks will probabl

            • by Mal-2 ( 675116 )

              The number one complaint I hear from those forced to use Windows is that it takes forever to boot.

              Then they're doing it too much.

              It takes about 45 seconds for my desktop to come up from a cold boot to login screen, and I have not yet sprung for an SSD. This is long enough to be mildly annoying, but not nearly long enough to get up and do something else. My laptop takes more like three minutes, but it's a 1.6 GHz E-350 (2 cores). It's still not a huge problem because the desktop just gets put in Sleep mode and the laptop runs continuously (I have several services running on it 24/7 in addition to using i

          • by g0bshiTe ( 596213 ) on Tuesday March 31, 2015 @09:20AM (#49378569)
            It's interesting, as a techie I feel constrained and restricted on tablets and even my smartphone. I prefer the jiggery pokery of tech vs the walled garden approach. Oddly I've not had a virus or malware infection on my computer since the late 90's.

            The problem may become winnable if websites cease using infected ad hosts for revenue at the cost of their users sanity and security, let's face in todays internet most infection probably stems from infected advertising.
        • by fuzzyfuzzyfungus ( 1223518 ) on Tuesday March 31, 2015 @06:42AM (#49377967) Journal
          And, unfortunately, ChromeOS is the comparatively softcore version of dystopian cryptographic lockdown. A ChromeOS device certainly works most smoothly if you leave it set to factory defaults, and generally play like a good little consumer; but, at least for now, there's a deliberate, documented, we-don't-assure-that-you'll-like-the-results-but-here's-how-to-do-it, switch for turning off the verification, becoming root, booting alternate payloads, and generally mucking around. My memory of the details is a little fuzzy; but I think that you can have your merry way with everything except some 'fallback' BIOS/bootloader that is hardware write-locked at the factory and isn't even modified by Google-provided updates; but instead intended to be just enough bootloader to un-brick basically anything you can do to the system in software. On some models, you can futz with that as well if you poke the right area of the board.

          It's definitely a 'crypto lockdown to make security easier, and possibly even possible' device; and Google hardly encourages you to go forth and GNU; but they at least allow you to. That puts ChromeOS devices well above all iDevices, a fair percentage of Android hardware, and potentially above some 'trusted boot' UEFI systems(depending on whether you can re-key the system or not). It's certainly a good example; but it's far less of an anomaly than one would like.
        • by nukenerd ( 172703 ) on Tuesday March 31, 2015 @06:51AM (#49377991)
          Defining hackers as people who take control of your computer (in whatever form) for their own ends, then this scenario of a "secure walled garden" is a win for the hackers, not a win for security. My idea of security is to prevent exactly this crap happening.

          Never mind that the hacker is a corporate entity listed on the stock exchange, they are still hackers. Never mind that they will claim that you agreed to this scenario by buying their kit (as if it will be possible to buy anything else, except similar rivals' kit) - that sounds just like an old style hacker claiming you agreed to their adware/botnet/malware by clicking on their email attachment.

          I recently bought an Android tablet. I keep getting a full screen advert for some game pushed in my face without even a clear way to dismiss it. It is a game in the Android app store they want me to buy. It severely pisses me off; but it is not (by their definition) malware, it is "official". This takes place within what would be the "secure walled garden". I would rather take my chances in the shark pool - at least I am in control.
          • Comment removed (Score:4, Insightful)

            by account_deleted ( 4530225 ) on Tuesday March 31, 2015 @07:35AM (#49378095)
            Comment removed based on user account deletion
            • Ok I can concede that, but why should a minority of us suffer due to a majority that aren't capable to make their own choices?

              Let's face it the day is probably approaching where we will have near zero control over our computers.
              • by swb ( 14022 ) on Tuesday March 31, 2015 @11:23AM (#49379231)

                but why should a minority of us suffer due to a majority that aren't capable to make their own choices?

                How is that not true of pretty much anything that has risk/danger associated with it which is ameliorated by prudence and caution?

                Drugs: Many people are capable of using drugs sanely without risking themselves or other people, but because some minority shows absolutely no control we have massive controls on drugs.

                Weapons: Many people are perfectly capable of safely owning even very destructive weapons without hurting themselves or others. But because some minority of people do batshit crazy things with weapons, we have a lot of controls on gun ownership and extreme controls on certain types of guns (automatic weapons, etc).

                The list is endless. A minority of people are stupid, lack self control and any kind of prudence so we implement controls which address the lowest common denominator, occasionally allowing some people to jump through hoops to obtain slightly more access to something, but often with another set of draconian controls applied.

                • by BVis ( 267028 )

                  The list is endless. Most people are stupid, lack self control and any kind of prudence so we implement controls which address the lowest common denominator, occasionally allowing some people to jump through hoops to obtain slightly more access to something, but often with another set of draconian controls applied.

                  FTFY.

              • by ceoyoyo ( 59147 )

                Why should the majority suffer because of a tiny minority who want to do stuff nobody else does?

                There will always be hardware for that minority. It might not be as pretty and polished as the consumer stuff, and you might even have to *gasp* build it yourself, but you'll still be able to get it if you want it.

          • by dave420 ( 699308 )
            So uninstall the nonsense app which shows you the ad. You are in control, but you've assumed you're not, and sealed your own fate. While arguably Google can be held to blame for you not knowing how to operate your own Android device, you are arguably even more to blame. You not being in Google's "walled garden" (even though Android phones can leave any time they want, and many don't ever step foot in it) won't help you one iota if you can't figure out how to uninstall an app which is spamming you.
            • When the app randomly pops up with zero other apps running how would you suggest locating the offending app?
            • While arguably Google can be held to blame for you not knowing how to operate your own Android device, you are arguably even more to blame.

              For pretty weak arguments, that is. 99 percent of people just don't have the inclination nor desire to root their android devices. Blaming this on them is silly.

              Myself on the other hand, I love digging into operating systems and computers in general. One of my favorite parlor tricks is showing people Windows programs running in Linux on my Chromebook. Just to show I can. Or my HP Touchpad that I run Android on. Or my Windows PC that I dual boot into Mint, then run PC applications on it, Hell I even run my

          • either you bought an already compromised tablet or you installed something suspect from the appstore.

            and you can find out the offending app with free programs available from the appstore too, if you really can't remember what shit game you installed that it came with. if you don't have anything showing up on the application manager that you would guess to be the culprit, then your tablet came with the malware to begin with.

            you know what's funny? slashdot runs apps on the mobile side that occasionally just f

        • by AmiMoJo ( 196126 ) *

          Chrome OS is nice for some types of device, but won't replace workstations any time soon. Some tasks just need more power and flexibility. There is room for both, just like there is currently room for many different workstation operating system, or both laptops and tablets etc.

        • by DarkOx ( 621550 )

          I think you are correct but I hope you are wrong. The trouble with software not coming from the wild is it means there era of the hobbyist programmer is over. Which I think will in many ways also mean the end of innovation. Right now the app stores are full because there are enough people who already had the skills to create apps. They have those skills because they obtained them in a time where the barrier to entry was low. They had a PC and it was programmable and programmer friendly. So if folks th

          • by njnnja ( 2833511 )

            Isn't this complaint similar to someone in the 1800's complaining about how the big industrial machines make it so that hobbyists who craft a small engine in their barn are no longer competitive, or in the mid 1900's complaining about electrical technology, or the 1980's complaining about circuitry, or ten years ago you couldn't build a competitive laptop? We have been in a golden age of hobbyist software since the personal computer allowed large numbers of people to own computers at home, but maybe that te

            • by DarkOx ( 621550 )

              Isn't this complaint similar to someone in the 1800's complaining about how the big industrial machines make it so that hobbyists who craft a small engine in their barn are no longer competitive

              I think this is different, or maybe i just see it that way being closer to it. Big industrial engines did not replace small barn built engines, the supplemented them. The farmer still needed a crude well pump and could not afford to have some 2 ton lump of iron shipped from back east. Similarly that barn mechanic could find a place servicing those big industrial engines in the field, they were not designed to lock him out.

              Even today while the hobbyist isn't generally machining his own cylinder header any

          • The trouble with software not coming from the wild is it means there era of the hobbyist programmer is over.

            There will always be hobbyist programmers. We are slowly transitioning from the Wild West (a free for all where anyone can participate) to a mature technology (a cartel of established players), but that doesn't mean hobbyists will go away.

            Hobbyists are their own worst enemy. Crackers are just hobbyist programmers using their skills for evil. You give freedom to the general public and you're going t

        • by mlts ( 1038732 )

          This.

          What we will see are vendors conflating locking the device away from its user with anti-malware protection... two different things, but both are considered "security".

          I will also not be surprised to see more remote monitoring, where if a device reports that it was jailbroken or rooted, the cellular network blacklists that device's IMEI.

          The future is now. Look at the latest generation of consoles as what we are going to have in our pockets and on our desks. Consoles have no issues with malware and a 0

      • Barring some sort of radical change in priorities that causes the market to accept zero new features for, oh, a (human) generation or more, while vendors put out bugfix releases, 'winning' certainly isn't going to happen by doing conventional stuff; but harder.

        Pretty much says it all. The population of exploitable software, design, and hardware bugs is clearly quite large, and is unlikely to decrease much as long as "capabilites" grow and grow and grow.

        We live in a world dominated by wishful thinking then

    • Actually, it is not impossible to secure a computing system. So in the end I assume the OSs will win.

    • Re: (Score:3, Interesting)

      We will lose if Adobe makes an OS
    • by TheGoodNamesWereGone ( 1844118 ) on Tuesday March 31, 2015 @08:35AM (#49378333)
      The Bad Guys are winning, because this is a *law enforcement* problem, not just a technical one. Cybercrooks are engaged in the same kind of theft they'd engage in if computers didn't exist. In a world where police can't or won't do their jobs, putting a bigger lock on your door is not a long-term solution. With the IoT (dumbest idea EVAH!) it's only going to get worse. Weep for the future Na'Toth. Weep for us all.
    • We'll win the malware arms race somewhere about the time we win the wars on drugs, crime, and proverty.

      The only time you can "win" an arms race is if the other side becomes exhausted. Such wins are often pyhrric.

    • by gl4ss ( 559668 )

      well, "they" can "win".

      I mean, big corps can win and somehow manage to put in a system where you can't run applications you want to run on your pc.

      as long as you can run whatever program you want, there will be malware. and probably a little while after you can't run what you want but hackers can.

    • by invid ( 163714 )
      Once the internet is officially no longer anonymous, you'll see the power skew significantly toward 'the Man'.
    • Make everyone reboot into a clean OS every 30-60 minutes, where the "old used OS" is trashed. At least that eliminates the OS side of contamination.

  • At the moment the NSA & GCHQ, and other agencies [arstechnica.com] are at the behest of politicians [theguardian.com] that want to see all our communications are working against the security industry. If this continues I see a bleak future. But if we manage to get these organisations to support security I see a much better future.

  • by Anonymous Coward

    trojan horses

    The Greeks won that particular arms race.

  • you, me, and everybody else. As opposed to conventional warfare cyberwarfare is all but guaranteed to catch civilians in the crossfire.
  • This arms race will go for the users. The reason being that there's too much money in play to allow the opposite.

    Whatever has to be done will be done. If it becomes such a problem that the USA has to invent a "war on hacker" and start "bombing by IP", it will.

    But we're talking a long, long time from now. Like many, many... weeks.

    • Whatever has to be done will be done

      Whatever HAS to be done is already being done. Users are en masse accepting the level of risk as it exists today, so there is no reason to do anything more on the security side. We accept a certain amount of fraud and other crimes in the rest of the world, we will continue to accept this in the Internet world as well. Diminishing returns mean we will never pay the price to pursue eliminating the last 1% of online crime.

    • by gstoddart ( 321705 ) on Tuesday March 31, 2015 @09:06AM (#49378491) Homepage

      This arms race will go for the users. The reason being that there's too much money in play to allow the opposite.

      I'm inclined to think the opposite.

      All of the companies who want to sell us products care only about that. They don't give a damn about the security of those products.

      Until consumers wise up and insist on security, or corporations carry some liability for failing to do that, then corporations will just push stuff out the door with half assed security.

      It can't just be a war on hacker. It has to also be a war on products with utterly crap security which never gets fixed. Because this Internet of Stuff is shaping up to be some of the biggest security holes imaginable.

      Most consumer products do terrible stuff like transmitting passwords in the clear. Chasing down hackers who exploit incompetently/lazily written products can never overcome that.

      • To follow that, the security problems we're discussing might not even be on the end user's devices themselves.

        The biggest holes seem to be with the corporations data security (or lack thereof) and willing sharing of personal information to even less secure third parties.

        If you're worried about identity theft, malware from some shady website may not be as big of a concern as a data breach involving thousands of customers.

  • by gweihir ( 88907 ) on Tuesday March 31, 2015 @05:42AM (#49377827)

    It is bad enough as it is with most software being insecure. Sabotage only makes things a lot worse. And for what? A zero-success track-record against terrorism? Industrial espionage? Having dirt on any possible future and present President, Congress Man, Senator?

  • As long as consuming content over the internet does not require downloading and running code, it will stay relatively safe.

    • by Anonymous Coward

      As long as consuming content over the internet does not require downloading and running code, it will stay relatively safe.

      Or as long as you didn't communicate using OpenSSL, used Bash(door), used Linux glibc (ghost), etc.

    • Re:depends (Score:5, Insightful)

      by Kjella ( 173770 ) on Tuesday March 31, 2015 @07:11AM (#49378031) Homepage

      You mean like browsers and Javascript? In that case 99% of the population has lost already. The pwn2own competition results are rather miserable [wikipedia.org]. The part that /. probably doesn't want to hear is that the primary effect is centralization and gatekeepers.

      Take Usenet for example, it got overrun by spammers and trolls because there was no real way to block them and the few moderated groups basically meant a few people were in control of the discussion. Instead we moved to forums, where you could use CAPTCHAs and various other tricks to block mass sign-ups, moderation, flagging of abusive users and so on. They're not perfect, but they work okay.

      Why do so many people use Facebook instead of email? Same thing, much less SPAM. For the longest time, Linux users hailed the repository model over the Windows "download random exe from the Internet" model. Then Apple took it to the extreme with the "one store to rule them all" and suddenly it was a problem. Even on Android you have to pass by huge warning lights to enable third party repositories and Windows Phone has as far as I know joined Apple in the "one store" model.

      My guess is that they'll push it to the cloud so all the application code runs on a server and they just need to lock down the browser, more per user&app sandboxes, more difficult time running unsigned software and more users with computers that need Apple's, Microsoft's or Google's sign-off to run an application. The average user simply doesn't understand the micromanagement involved, same way users won't use NoScript when browsing the web. They'll "outsource" it.

      • You mean like browsers and Javascript? In that case 99% of the population has lost already. The pwn2own competition results are rather miserable.

        I don't think it's so bad. The pwn2own competition is notable primarily for the ridiculous levels of skill required to actually beat modern browser security (note: I do not include the still unsandboxed Firefox in this category).

        What's been happening in recent years is that more and more bugs are being found by whitehat hackers first, with the complexity and diffic

      • And the irony is the spammers did such a good job of forcing people off usenet that there were so few people left the spammers gave up bothering and moved on to more lucrative enviroments to screw up. The upshot is that usenet is actually quite usable now, though NNTP servers are slowly disappearing sadly.

  • by wonkey_monkey ( 2592601 ) on Tuesday March 31, 2015 @05:49AM (#49377843) Homepage

    Which side is going to win?

    What makes you think it'll ever be over?

    Here's a sports analogy [youtube.com], if you need one.

    (the radio version was better but I couldn't find it)

  • that's all we can be certain of really.

    The good news is that the public are becoming more educated on the subject. I've noticed it over the years. They're getting more mindful about not sticking their dicks in electrical sockets... even if the buzzing sensation is momentarily enjoyable.

  • Without Cats and LOLs life is not worth living. Civilization will collapse out of shear apathy.

    On the plus side, global warming will not be a problem because all economic activity will cease and no fossil fuel will be consumed.

    Japan and the US will be particularly hard hit. Parts of the EU as well. It's more uncertain what will happen to emerging economies like China, India and Brazil. LOL and/or cats is such a world wide phenomenon that no place will escape unscathed.

    No matter what the Amazon will start

  • Once the internet became a thing regulated by government as opposed to technologists, it was lost. The intangible reality of it was lost, and now you can steal things off of the internet...even though we the owners and thieves know this is a false economy, at the end of the tunnel there is real money. So now the wrong people have taken interest and subsequently control. A new unregulated internet has to be created which is something more than a layer of encryption laid over the original. We've fucked this o
  • It's the same as with two teams of lawyers battling it out for two parties: in the end only the lawyers really win.

    These hackers on both sides basically just cause employment for each other, and therefore both sides win, and all those not involved are the biggest losers.

  • Two things:
    - the US has accelerated the development of malware and lifted it to a new level.
    - the US has lots of advanced technology that's vulnerable to malware.

    So if there's a cyberwar between backward North Korea and the US , who you'll think will lose?

  • by Anonymous Coward on Tuesday March 31, 2015 @06:44AM (#49377973)

    Since the NSA seems to be the most heavily capitalized producer of both malware and mitigationware, I think the question of which side is going to win is a bit irrelevant. Yes, they will win.

  • The future is on whitelisting, which assumes the removal of anoynymity for websites and advertisers, and certificates for executables. Freedom fighters will whine and moan, but that's what will happen.
  • by Kardos ( 1348077 ) on Tuesday March 31, 2015 @07:17AM (#49378055)

    The open source software world will win in the long term through sustained application of the continual improvement process. There are millions of "us" and only thousands of "them". The most vulnerable in five years time will be closed systems.

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      >There are millions of "us" and only thousands of "them".

      The people auditing OpenSSL after the Heartbleed incident would like a word with you...

      (By the way, thank you. Next time some /.er says nobody here ever "really" believed in the whole "many eyes makes all bugs shallow" fallacy, I shall point them to your post.)

  • The internet will be harder and harder to use, it will be a more dangerous place every year, and the skills you'll need to use it without being robbed or blackmailed will increase. I suspect there will be parallel internets, usable by tech savvy people only, as a layer on top of the net as we know it, similar to the dark nets we see now. 20 years from now, most of us here will be able to use the net in a more or less safe way, whereas a majority of people will not.

  • by mentil ( 1748130 ) on Tuesday March 31, 2015 @07:42AM (#49378127)

    Minor infections will become less common, as the attack surface area is reduced and mitigated over time. New APIs and interfaces will be created, creating N+1 standards, but they'll be more secure than the older ones they supersede. For example, Flash and ActiveX are slowly going away in favor of more secure alternatives. How many critical html5 vulnerabilities are found in your browser of choice compared to critical Flash/Java Web Client vulnerabilities? Open source is a big part of it, but security being baked into the design rather than being tacked-on after thousands of vulnerabilities have been written into legacy code is bigger.

    On the downside, when you DO catch an infection, it'll be nasty. New methods for hiding in firmwares will require removing chips and re-flashing them, and unless open firmware takes off in a big way, in practice this will mean replacing hardware very carefully so it doesn't infect the new hardware. It will be virtually undetectable, and have countless methods for defeating airgapping, virtual machines, decompiling, reverse engineering, and antivirus software. So once your machine is owned, it'll really be owned.

    The best thing that can be done is to systematically eliminate every motivation to deploy malware: make spam unprofitable, harden SCADA to eliminate sabotage, mature altcoins to not benefit from stolen processing cycles, and regulate online advertising so ad injection is pointless. Also, rework the protocols that allow DDOSing, and require actual two-factor authentication for financial websites/transactions. Eventually, I think malware will be rare/invisible enough that only computer scientists will know about it, ordinary users won't worry about it.

  • by account_deleted ( 4530225 ) on Tuesday March 31, 2015 @07:43AM (#49378135)
    Comment removed based on user account deletion
  • It's ironic that I'm seeing an ad for malware (myturbopc.com) at the top of this /. page
  • "We've been in a malware arms race since the 1990s. Malicious hackers keep building new viruses, worms, and trojan horses, while security vendors keep building better detection and removal algorithms to stop them."

    This document from 2005 sets out why relying on detecting malware doesn't work. ' The Six Dumbest Ideas in Computer Security [clemson.edu]'

    "Do you imagine an internet, 20 years from now, where we don't have to worry about what links we click or what attachments we open? Or is it the other way around, with
    • The "real" attacks, the ones that penetrate networks and steal data, usually aren't done from botnets. Heartbleed was a server-level hole; exploits in routers abound. The whole system would have to be re-worked from the ground up to get rid of all the holes; then we have people like at the NSA who would purposely put them back again.
    • Like rowhammer [cisco.com], these are the serious type of attacks we should be aware of. Phishing is because people are stupid; you can't fix stupidity.
  • by Anonymous Coward

    My answer is: C none of the above.

    There are third parties who are going to come out winners here.
    - nation-states that use/abuse the hackers (think China, the NSA, and such who subvert botnets, who already know who-is-who. Companies who want to hurt the competition in illegal ways and not get caught can sponsor hacks of competitor flagships.)
    - hardware/software vendors who provide (mediocre) protection against unforseen threats. (The same fear-based motivation for the ignorant masses is used by politicians

  • I see a "new" network, proprietary and locked down, for "real world" applications. All the "important" data will be on it only; banks, Wall Street, governments, etc will use this from now on. They will publish some type of virtual machine for "regular people" to use to do banking and whatever; or even two physical machines in one. Eventually the current "internet" will become less and less of a target as it looses it's financial impact and becomes completely social and informational only. FTTH could do
  • The issue is, under what circumstances is it worthwhile to spend time writing a virus/trojan/whatever.

    Clearly financial gain is THE prime motivator, although notoriety is a close second - mostly because it leads to money.

    The war, though, is certainly winnable. The idea of certified manifests is getting close to the solution - there is certainly more work and thought to be applied to that though.

    End user expectation management is in order too. The days of downloading software are coming to a close. I
  • A malware arms race is like Alien vs Predator: no matter who wins, we lose. Or so I've been led to believe.
  • Our biggest challenges with security are asshole governments who want to undermine security so they can spy on us, and incompetent companies who sell us insecure products because they just want to push some bauble out the door.

    As long as we have these two problems, the malware folks will always win, because we will not have the tools required to keep them out.

    If spying governments and inept corporations are the weak links, we're pretty much screwed.

    So the next time some asshole in a spy agency says we shoul

  • by Cro Magnon ( 467622 ) on Tuesday March 31, 2015 @08:53AM (#49378415) Homepage Journal

    Neither. The malware war, like tic-tac-toe and global thermonuclear war, is unwinnable.

  • With the latest exploits talking about dormant BIOS exploits impossible to remove without a JTAG hardware programmer, or USB port reprogramming with direct access to your memory... I'm afraid the worse is yet to come. This kind of exploit is mostly OS agnostic (plug in the wrong USB device and get completely owned), directly on hardware, undetectable, etc... If the authors want to keep it dormant for long periods they can.

    When the first bots started I wish the internet providers had taken steps to complet

  • Virus and antivirus suppliers have a symbiotic business relationship, each requires the other to continually make slow progress, rendering their old product useless, so they can sell their new product. If either side 'won', then they would cease being able to sell upgrades, their business model requires then not to win.

  • Computers roughly double in power every two years.
    That means every two years, malware can be twice as destructive.
    Security constantly improves, but it doesn't improve as fast.

    Measured as a percentage, the amount of damage being done will go down.
    Measured as an absolute, the amount of damage will go up.

  • It is going to get to the point where the only viable solution is a trusted sandbox. It will be something along the lines of a TPM chip to make sure that the OS image / boot loader has not been compromised, combined with a white listed set of applications and trusted content sources.

    People are either going to give up computing freedom for security, or they are going to become desensitized to and accepting of the fact that their "private / personal data" is neither.

    • > It is going to get to the point where the only viable solution is a trusted sandbox. It will be something along the lines of a TPM chip to make sure that the OS image / boot loader has not been compromised, combined with a white listed set of applications and trusted content sources.

      Maybe .. But seriously, it's not clear that this point that a trusted sandbox is actually achievable even in concept, much less in practice. Nor is it clear that anyone other than some classes of users who are forced by la

      • by dave562 ( 969951 )

        Nor is it clear that anyone other than some classes of users who are forced by law or employer dictate to use a trusted system actually would do so. No or very restricted email, social networking, etc.

        This is the environment that I work in. We use a combination of Citrix and VMware 'non-persistent disks' to provide a locked down environment that reverts to a clean, known good configuration every time a new session is established. We have to maintain that kind of environment because we work with sensitive

  • People, i.e. Joe Public, don't understand what a massive gift technology is to either enslave or free them. In the cyber era technical folk will be both revered and feared because people don't invest in the critical thinking skills required to be responsible netizens, frankly browse here at -1 and see how many pointless annoying trolls there are. Perhaps people should have to be qualified and prove they are responsible enough to use the net.

    The Information Technology arms race should have always been a sta

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...