The Lycos Network Lycos Home  |  Site Map  |  My Lycos   

LOOK FOR 

 
Print this



Big Blue Puts On the Scare
Reuters

12:25 a.m. Sep. 6, 2001 PDT
 

LONDON -- Computer hackers come in many shades: extortion artists, corporate saboteurs, determined teenagers and legitimate IT professionals. But according to security experts at International Business Machines, they have one thing in common: Every office has at least one.

Seizing upon the timely topic of Internet security risks, IBM launched a global advertising and public relations initiative this week to plug its e-business security software and consulting expertise.

Business managers, concerned at the threat of attack, are fortifying their internal computer systems. Last week, a Corporation for British Industry survey revealed that two-thirds of British businesses have been the victims of serious computer-related incidents, whether they be hacking, a virus attack or some form of cyber fraud.


    


Get Wired News delivered to your inbox or hand-held device.


B U S I N E S S
  Today's Headlines
2:00 a.m. Sep. 10, 2001 PDT
 
Paying More for an Xmas Xbox

Wi-Fi Cost May Be Sky High

Protestors Wish for Cams to Scram

Napster's New Tune: Pay Labels

Napster Eclipsed by Newcomers

Amazon Head Mum on Profits

Making Calls In a Pre-3G World

Quantum Crypto to the Rescue

Brit Farmer's Pie in the Sty Idea

Write Your John.Hancock.Name Here

MS Fails to Enliven Tech Stocks

MS: Xbox Will Reign Supreme

Who's Reading Your Resume?

Merlin Has MS Going Places

Vodafone Cuts 3G Speed

Big Blue Puts On the Scare

MP3.com: New Leadership, Focus

XP Cracks Appear Before Product

HP Chief Dropped Hints

Controversial Shock Site for Sale

Aibo Has Some New Playmates

The Positive Side of Biometrics

Mobiles Bad for Birds, People

Taking Stock of HP, Compaq

Apple Expands as PCs Cut Back

Burning Man Burns Brightly

Look Out IBM: HP Buys Compaq

Pioneer Steps Out of Net Rutt

Motorola's Blazing-Fast New Chip

More Black Voices in Print

A Vaccine for Plants

Great Train Robbery


See also:
Beware That Company Box You Took
All Quiet on Code Red Front
Wireless Networks in Big Trouble
New MS Tool: Good and Bad
Study: Who Needs Privacy Laws?
Infostructure strengthens your backbone
Give Yourself Some Business News

This means that software firms and security consultancies may once again have a big market for their services.

The corporate world, however, has been faced with a precarious trade-off when it comes to IT security. Damaging corporate viruses such as the Code Red worm, which continues to replicate around the Internet unchecked, have cost industry billions of dollars in lost productivity and software upgrades, experts say.

At the same time, belt-tightening initiatives tighten the corporate budget process, limiting IT investment. IBM, for one, is hoping the fear factor will motivate budget managers not to skimp on security initiatives.

At a press event in London on Thursday, IBM introduced two veteran security specialists -- dubbed "ethical hackers" by the company -- to discuss the fragile state of Internet security and to get its message across that upper management has to be more involved in IT defense.

"Ultimately, security is a management issue," said James Luke, information warfare specialist with IBM Global Services in London.

Another reformed hacker, now employed by IBM as a security expert, said that the incidence rate of viruses was on the upswing -- and from a seemingly benign source.

Novice hackers, called "script kiddies" in Internet parlance, "can be the most dangerous," he said. They are among the largest population of hackers, he added. Often, they are teenagers who get their kicks out of defacing or blocking access to sites by employing virus programs downloaded from the Internet.

"They know just enough to be dangerous," he said.

One famous "script kiddie" hacker was the 20-year-old Dutch man who earlier this year admitted to engineering the Anna Kournikova e-mail virus. The hoax e-mail carried an attachment that appeared to be a picture of the tennis star. Once opened, it spread around the world slowing down e-mail systems and shutting down some corporate servers.

Other virus authors, including the mastermind behind the recurring Code Red worm, go undetected. Last month, Computer Economics of Carlsbad, California, reported that the Code Red worm, which targets unfortified computer servers, did $2.6 billion in damage.

Blueyonder, a British broadband provider from Telewest Communications, continues to carry a warning on its site that the Code Red worm is affecting service performance for some of its customers.

Copyright © 2001 Reuters Limited.


Have a comment on this article? Send it.
Printing? Use this version.


Related Wired Links:

Study: Who Needs Privacy Laws?
Sep. 5, 2001

Beware That Company Box You Took
Sep. 4, 2001

New MS Tool: Good and Bad
Aug. 24, 2001

Wireless Networks in Big Trouble
Aug. 20, 2001

All Quiet on Code Red Front
Aug. 17, 2001



Feedback  |  Help  |  About Us  |  Jobs  |  Advertise
Editorial Policy  |  Privacy Statement  |  Terms and Conditions

Copyright © 2001 Wired Digital Inc., a Lycos Network site. All rights reserved.