Pickr
  • Latest News & Reviews
  • Recommendations
  • Phones
  • Earphones
  • Sound
  • The Wrap
No Result
View All Result
Pickr
  • Latest News & Reviews
  • Recommendations
  • Phones
  • Earphones
  • Sound
  • The Wrap
No Result
View All Result
Pickr
No Result
View All Result

Cybersecurity risk growing, and time is a factor

Leigh :) StarkbyLeigh :) Stark
June 7, 2017
Reading Time: 2 mins read
Share on TwitterShare on FacebookShare on LinkedInShare over email

It’s always been important to watch what you click and to have some form of internet security in your life, but a report this week reveals just how important being aware of security is, especially for the patch to roll out.

Have you ever wondered how long it takes for a security flaw to become more than just an vulnerability out in the wild, and for it to become potentially dangerous?

According to a new report released this week by McAfee, the answer may surprise you, because while security holes and problems are discovered fairly regularly for mobiles, tablets, laptops, and other devices, it turns out that the resulting exploits are just as quick to appear.

Commissioned by McAfee (formerly Intel Security), the report reveals how critical time is for exploits, and highlights why security software is not only important, but necessary, with cybercriminals ready to take advantage of the exploits practically the moment the exploits are found.

McAfee’s research suggests that by the time news is out of a new exploit, roughly 80 percent of exploits already exist, while only 70 percent of security companies are ready, with signatures the key to solving them, but companies not always ready.

While the research was written with business cases in mind, it’s relevant to all, particularly because it highlights the importance of cognisance and being aware — and responsible — for knowing what’s coming into your mail, and what you should and shouldn’t click.

Security companies will always work the fastest to ensure the patches and signatures are ready to block and quarantine exploits in a fastest time-frame, but it’s always possible that they won’t get out a solution in the time it takes for you to click.

In light of this, it’s critical that we as netizens become more aware of what we click, of the emails we open, of the websites we visit, and of the files we download. With that responsibility comes the questioning and a hint of scepticism, and the possibility that we’ve saved ourselves from opening something that might leave us in a worse off position.

Leigh :) Stark

Leigh :) Stark

A technology journalist working out of Sydney, Australia, Leigh has written for publications including The Australian Financial Review, Popular Science, APC, and more since 2007, appearing on ABC Radio and TV on Nine. Check out his most recent media appearances.

Related Posts

Scammers try a dark approach with coronavirus vaccine scams
Security

Google Drive goes on defence with anti-malware, anti-phishing

May 17, 2022
How chatbot scams work
Online

Why passwords are problematic, but why we have trouble moving on

May 5, 2022
What is stalkerware?
How to

How an NBN scam can appear convincing (and why it’s not)

February 28, 2022
ADVERTISEMENT

  • Recommendations
  • Best Picks
  • Methodology
  • About
  • Media Appearances
  • Contact
Change the way you choose.

© 2016 to 2022 Publishr Pty Ltd: ACN 624 227 256
All rights reserved.

No Result
View All Result
  • Latest News & Reviews
  • Recommendations
  • Phones
  • Earphones
  • Sound
  • The Wrap

© 2016 to 2022 Publishr Pty Ltd: ACN 624 227 256
All rights reserved.