T security technologist Dave Waterson wrote an interesting article on his version of the top 10 security myths. He covered some common user and company misconceptions in the industry and explained why they are myths. In this blog I am going to build on what Dave started, but with a twist. Let’s consider how the malware author or hacker may address these myths from their perspective.
Myth 1: Brand Name Products Rule
Hacker's Perspective: Yes, please continue to put your faith entirely into these products. I run the same applications to test my creations. I tweak them to avoid detection. The longer you use them, the longer I stay hidden and profitable. It takes more than that to stop me.
Myth 2: Careful Surfing Makes a Safer Internet
Hacker's Perspective: You are correct, sir, but now I am starting to compromise and use those very (formerly) safe sites you frequent, to help spread my work.
Myth 3: Password Smashword
Hacker's Perspective: Please continue thinking strong passwords are ineffective. Better yet, store them in contacts and SMS messages on your phone for me to find with my deviant mobile creations.
read more..........http://blog.solutionary.com/blog/bid/93519/A-Matter-of-Perspective-Understanding-Security-Myths-and-the-Malevolent-Mind