Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 30 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Schneier – Major vulnerabilities are out there waiting to be discovered

by The Gurus
August 6, 2014
in Editor's News
Share on FacebookShare on Twitter

More searches will uncover more vulnerabilities, as flawed systems are still prevalent.
 
Speaking at the CodenomiCON 2014 event in Las Vegas, cryptographer and C03 Systems CTO Bruce Schneier and former Presidential advisor and chairman of the board of Codenomicon, Howard Schmidt, said that they believed that the discovery of Heartbleed was one of many and if you kept looking, you would find more flaws.
 
Schmidt said that as attackers keep stock piling zero-days and keep searching, you will find more and more flaws, so the real problem was how to remediate them.
 
Schneier called Heartbleed “unique and not a typical vulnerability” as it did not seek access, and rare as it was like nothing that had been discovered for a long time. He said: “I was worried when it appeared as you needed to take steps to get security under control and it is something we have not got control back of, as there is no secure key.
 
“What it showed is that for everything we know about vulnerabilities, we know there are more of them, but when you patch them you are not making software more secure, but vulnerabilities are plentiful but to make a difference we need to get ahead of the bad guys in finding them. We need to understand how they work and I don’t think we do.”
 
Schmidt recalled the buffer overload and ASM1 discoveries, and he believed that flawed systems still exist in multiple areas. “Unless we design with fewer vulnerabilities, we will be dealing with this for years.”
 
Schneier said that we have gotten better and better at finding vulnerabilities and patching, so asked if everything is getting better, you have to ask why things are not better. “It is complexity which is the worst enemy of security and it is more complex, and getting worse as it improves,” he said. “It is counter-intuitive and more complexity means more vulnerabilities.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

Schmidt calls for more “security by design in what we do"

Next Post

BSides Las Vegas – Incidents happen, react and learn from them

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information