{"id":35,"date":"2010-05-07T10:54:32","date_gmt":"2010-05-07T18:54:32","guid":{"rendered":"http:\/\/www.dragonwarz.net\/?p=35"},"modified":"2010-05-07T10:54:32","modified_gmt":"2010-05-07T18:54:32","slug":"organizations-assuming-customers-computers-are-infected","status":"publish","type":"post","link":"https:\/\/dragonwarz.net\/?p=35","title":{"rendered":"Organizations assuming customers computers are infected"},"content":{"rendered":"<p>This is actually a good way to think when your providing Internet related services. \u00a0Assume the worst has\u00a0happened\u00a0to your clients computers and create things that are still as secure as possible.<\/p>\n<p><em>&#8221; &#8220;For years, security experts, analysts and even users have been lamenting the state of desktop security. Viruses, spam, Trojans and rootkits have added up to create an ugly picture. But, the good news is that\u00a0<a href=\"http:\/\/threatpost.com\/en_us\/blogs\/have-we-lost-desktop-security-battle-050610\">the desktop security battle may be over<\/a>. The less-than-good news, however, is that we may have lost it. Jeremiah Grossman, CTO of WhiteHat Security, said Thursday that many organizations, particularly in the financial services industry, have gotten to the point of assuming that their customers&#8217; desktops are compromised. And moving forward from that assumption, things don&#8217;t get much prettier.&#8221;<\/em><\/p>\n<p><em>&#8220;It goes on to speculate about home routers being targeted and infected.&#8221; &#8220;<\/em><\/p>\n<p><em><span style=\"font-style: normal;\">It&#8217;s kind of scary to think of your router being infected though. \u00a0It would be very hard to detect unless you connected a machine in between the Internet and your router to analyze traffic (if at all possible with some ISP&#8217;s all in one gateways). \u00a0The hacker could redirect all or certain traffic to a computer that analyzes the data for passwords, user information, etc. <\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is actually a good way to think when your providing Internet related services. \u00a0Assume the worst has\u00a0happened\u00a0to your clients computers and create things that are still as secure as possible. &#8221; &#8220;For years, security experts, analysts and even users &hellip;<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/dragonwarz.net\/?p=35\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[13],"class_list":["post-35","post","type-post","status-publish","format-standard","hentry","category-random","tag-security"],"_links":{"self":[{"href":"https:\/\/dragonwarz.net\/index.php?rest_route=\/wp\/v2\/posts\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dragonwarz.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dragonwarz.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dragonwarz.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dragonwarz.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35"}],"version-history":[{"count":0,"href":"https:\/\/dragonwarz.net\/index.php?rest_route=\/wp\/v2\/posts\/35\/revisions"}],"wp:attachment":[{"href":"https:\/\/dragonwarz.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dragonwarz.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dragonwarz.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}