Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software Security

Windows Infected in 12 Minutes 355

Uber-Review writes "The speed with which PC's can become infected has now shortened. If your Windows computer is not properly protected,it will take 12 minutes before it becomes infected, according to London-based security company, Sophos. They have detected 7,944 new viruses in the first half of 2005, a 59% increase over the same time span last year."
This discussion has been archived. No new comments can be posted.

Windows Infected in 12 Minutes

Comments Filter:
  • by super_ogg ( 620337 ) on Tuesday July 05, 2005 @10:00AM (#12984846) Homepage
    So there are variants and minor changes... do we really count these as new viruses?
    ogg
  • by Anonymous Coward on Tuesday July 05, 2005 @10:03AM (#12984866)
    Let's imagine for a second that I'm a large western government, concerned that my citizens are building infrastructure that could be used against me. Perhaps I foresee an oil crunch in a few years and I'd prefer a somewhat tighter control over information, debate, and possible anarchy. Perhaps I've been infiltrating the hacker underground for a while, and find the idea of being able to control hundreds of thousands of zombies quite interesting. Maybe my agents have tried various ddos attacks in the past, and we're satisfied that we can bring down any web site, any internet service, however large.

    Now, as a citizen of such a government, I have to ask, "why when 80-90% of domestic PCs are infected, is nothing being done at the legislative level?" Could it be that a world of zombied PCs is just too useful as a tool of control?

    Just thinking out loud...
  • by AutopsyReport ( 856852 ) on Tuesday July 05, 2005 @10:07AM (#12984900)
    What I'd like to know is what are they doing during those 12 minutes for Windows to become "infected."

    For years I have run Windows straight out of the box (no firewall, no security software, nothing), and I've only ran into two viruses -- one through Kazaa, and one through IRC (both my fault).
    I can understand that Windows is vulnerable -- but if I've managed to run Windows for many years without any major problems, then I'm curious what they are doing during these 12 minutes to arrive to such a conclusion.

  • by chrisnewbie ( 708349 ) on Tuesday July 05, 2005 @10:09AM (#12984928)
    Just leave your computer open and live on the internet without a firewall. I guarantee you that in less than 30 minutes, you will porbbaly catch something.
    It's even faster if you have a static I.P.

    I know, i was testing some vpn inside my company and i hooked the laptop to my external hub and it took about 20 minutes to get a worm, and i wasnt doing anything and my win2k was fully patched.
  • by digidave ( 259925 ) on Tuesday July 05, 2005 @10:19AM (#12985011)
    I guess one of the problems is that you can be infected before you have a chance to download a firewall. Unless you're on the newest version of Windows you're pretty screwed unless you can configure packet filtering on the NIC.
  • by marcovje ( 205102 ) on Tuesday July 05, 2005 @10:25AM (#12985058)

    So apparantly people start an email client _on average_ within 12 minutes after an install and catch a virus? That is pretty rough, and IMHO unrealistic. I don't know what most people do, but I'm usually still install drivers, turning off teletubby mode etc.

    Sounds like the vendors included a few old worms that snatch chronically unpatched systems, and gave it a spin to boost antivirus sales.
  • Re:Nice... (Score:1, Interesting)

    by apoc.famine ( 621563 ) <apoc...famine@@@gmail...com> on Tuesday July 05, 2005 @10:28AM (#12985088) Journal
    No, this is Trolling v3.1. I mean, anyone who reads this site most likely saw this the first time around. Even if they didn't, they read the original article, or the massive tech-website and/or blog coverage of it.

    This is indeed the new form of trolling - except way better than ever before. With no way to mod the article, submitter, or editor, this new trolling can go on for months or years. Rather than troll 1-2 people who then get modded "-1 offtopic", and the troll modded "-1 troll", they can now troll entire articles by submitting dupes. No mods, no karma hit, no being buried by higher-modded comments.

    It's god-damned brilliant.
  • by Vapon ( 740778 ) on Tuesday July 05, 2005 @10:28AM (#12985093)
    When MS_Blaster was at its peak I had computers that were infected before the install finished if I left it connected to the internet.
  • Destroy Slashdot (Score:0, Interesting)

    by Anonymous Coward on Tuesday July 05, 2005 @10:50AM (#12985265)
    Yes, once again its another dupe - why is everyone still so surprised that this happens? The 'editors' barely pay lip service to their title and I doubt very much that they read the comments either. At face value there is no real passion from the creators of the site - its just the same old shit day after day.

    To explain further, Slashdot exists for one purpose: to make money for parent company OSDN. There is nothing wrong with that in itself but don't expect a high quality site the way its currently run. The Slashdot business model (if you can call it that) seems to be to provoke reaction from the loyal crowd of slashbots that frequent the site. Inflammatory / trollish stories (e.g here [slashdot.org]) and dupes cause the page hits (and therefore ad revenue) to go through the roof.

    As a result, most of the comments I see on the stories are neither insightful, interesting or informative. There seems to be no real balanced discussion - something I feel is a product of the moderation system which rewards those who conform to the slashbot mindset and censors everything else. This democratic method of editing the comments is terrible - especially where technical issues are concerned, as a lot of nonsense is modded up by people who don't know otherwise.

    You are probably wondering why I read Slashdot. Partly morbid curiosity and partly to laugh at both the flame wars which invevitably break out and the well crafted trolls.

    To conclude, Slashdot is neither really "News for Nerds" nor is it "Stuff that matters". If you want the former, go to somewhere like arstechnica [arstechnica.com]] or kuroshin [kuro5hin.org] and if you want actual stuff that matters: Infoshop [infoshop.org]
  • Re:oi vey... (Score:4, Interesting)

    by harrkev ( 623093 ) <kevin@harrelson.gmail@com> on Tuesday July 05, 2005 @10:53AM (#12985285) Homepage
    But what I want to know is how do these machines get infected???

    It is certainly easy to get infected while using e-mail or surfing. But now that SP2 comes with a firewall turned on by default, shouldn't it now be impossible to infect a SP2 machine without some sort of user intervention?

    Does the SP2 firewall have some holes pre-poked in it already? Are there flaws in the firewall?
  • by Dun Malg ( 230075 ) on Tuesday July 05, 2005 @11:11AM (#12985459) Homepage
    I can understand that Windows is vulnerable -- but if I've managed to run Windows for many years without any major problems, then I'm curious what they are doing during these 12 minutes to arrive to such a conclusion.

    I've had my "NAS pr0n box" (an old Athlon 1600+ w/250GB worth of misc drives) running un-updated WinXP Pro (the "reset5" 30-day hack precludes updates) for over a year on the same static IP, open to the whole intarweb, and it hasn't picked up a single virus. I use it for torrents, eMule, kazaa-- basically all and sundry untrustworthy site scouring-- and still it works. I recently installed McAfee on it, just to see what viruses I'd "collected", and there's nothing! I think the biggest deciding factor in how fast your exposed windows machine gets "pwned!" is whether or not it's in the IP address range assigned to a large ISP that caters to the Unwashed Masses (e.g. Comcast). Using an ISP that markets to the bespectacled nerd crowd puts your IP address in a range that probably won't be tapped for a "zombie harvest".

  • Most retarded story. (Score:3, Interesting)

    by RingDev ( 879105 ) on Tuesday July 05, 2005 @11:41AM (#12985716) Homepage Journal
    This is as wonderfull as the Zombie Dog story last week. No facts, no information about the PC, connection, patch history, viruses, etc. Just some random number and some advertising.

    Big suprise, the world most popular OS has the largest number of virus's written for it. Another big suprise, leave your machine unpatched and unprotected on a network and it'll get infected.

    -Rick
  • Suggestion (Score:3, Interesting)

    by DrSbaitso ( 93553 ) on Tuesday July 05, 2005 @12:15PM (#12986080)
    For stories that subscribers can see from "The Mysterious Future", but a button that can be clicked on the story title if the poster thinks the story is a dupe. I realize that each Slashdot author doesn't read every story that is posted, but enough other people would notice that dupes could get caught before they make the main page.
  • Re:How about Fedora? (Score:2, Interesting)

    by periol ( 767926 ) on Tuesday July 05, 2005 @12:20PM (#12986126) Homepage
    Just think about it for a second. A Windows XP computer is infected within 12 minutes because of unpatched exploits that need to be updated from Microsoft. It's worms getting through open ports that infect the computer once it's plugged into the internet. A hardware firewall takes care of that worm traffic.

    But theoretically, those ports should be closed on Fedora already. And since most internet attacks are meant for Windows anyways, I should be safe not using the hardware router. But the truth is I don't know enough about the innards of Fedora 4 to know if it's a safe move or not.

    That's why I asked. Because Windows problems != Fedora problems necessarily.

Old programmers never die, they just hit account block limit.

Working...