Advanced systems to enforce computer security can help.
FORBES: Can You Keep a Secret? Protecting Your Business's Most Valuable Asset
And it also comes as Microsoft is trying to rewrite the rules for its dealings with computer security companies to stop them from revealing its security errors until it has found a cure for them - however long that takes.
"The phone has been ringing off the hook with executives taking down proposals they've had on the shelves a long time to deal with computer security and cyberattacks, " says Albert Decker, head of the unit.
If last month's Sony breach didn't already convince you to beef up your own computer security, now might be a good time to swap in 'Pa55werD1' for the rather pathetic 'password' you've been using to protect your own company's trade secrets for the last decade.
The CFAA and state computer crime laws initially were designed to restrict hackers from breaching computer security a sensible objective that, as I discuss below, should be preserved.
FORBES: The Computer Fraud and Abuse Act Is a Failed Experiment
When the latest version of Mozilla's Firefox was released in June, bugs that allowed a site to install malicious programs on a visitor's computer were reported to security vendor Tipping Point within hours.
The final myth is the one that leads to the most pronounced false sense of security - that my make of computer or operating system is not vulnerable to security problems.
Granick, who was also Civil Liberties Director at the Electronic Frontier Foundation before joining her new firm, says she has always given advice to people in the computer security field.
The courts have yet to decide who is liable if a computer system with lax security is used to launch a denial-of-service attack, but a number of lawsuits are pending.
ECONOMIST: Forensic computing studies the anatomy of computer crime
In other words, a lot goes on payments by one lot of businesses to another: the computer-security industry.
Consider AlienVault, a Spanish company that wrote open source tools to help companies report on computer security intrusions.
The Times said in an extensive article dated Wednesday that it had worked with computer security experts to monitor, study and then eject the attackers.
As part of a legal settlement to regain control of 3322.org, founder Peng Yong has given assurances that he will work with Microsoft and China's central computer security agency to limit abuse of the site's domains.
"Many perfectly legal things that could be done with data aren't being done, because people don't want to lose their jobs, " says a computer security entrepreneur who, like many interviewed for this article, was too fearful of the advocates to let his name appear.
The irony is that the legislation is based on fear, uncertainty, and doubt (FUD) versus facts, and it will do little to solve the security problems facing computer systems.
FORBES: URGENT: Businesses Must Act to Stop Congress on Cyber Legislation
"I trust (Attorney General Janet) Reno, but I don't know the intent of her successors, " said Jeffrey Schiller, an MIT computer security expert contacted to participate in the review.
CNN: Justice Department mum about who will review 'Carnivore'
Computer security experts believe the virus will be under control by Monday, but ILOVEYOU has already caused more damage than last year's Melissa virus, which spurred many companies to invest in costly and complex computer security measures.
Shahar Maor, an information-technology analyst at Israeli market research firm STKI, estimated that compared with large companies associated with defense or critical infrastructure, lower tier Israeli companies hire one-fifth as many information-security employees relative to computer users.
It contained a malware application, which had managed to bypass existing security controls, but was not able to spread through the computer system.
Kevin Mitnicks crime was to thumb his nose at the costly computer security systems employed by large corporations.
After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its security system over a 36-hour period.
ENGADGET: Chinese hackers target U.S. Chamber of Commerce, sensitive data stolen
Unfortunately, she clicked yes, and this fake-security warning led to her computer becoming as infected as a little kid after the first day of preschool.
After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.
She has been even fiercer when it comes to fighting hackers throughout 25 years in the computer security industry.
FORBES: Asia's Women In the Mix: Eva Chen Battles the Hackers
In America, a congressional committee for computer security has given failing grades to many of the federal bodies it scrutinises.
The team plans to demonstrate its findings at the Black Hat computer security conference, which begins July 27 in Las Vegas.
Computer security experts have warned users to be careful over how much personal information they share on the service, and to consider carefully their privacy settings.
The greatest threat to global cyber security today, according to Internet Security Systems researcher Josh Corman, may be your mother's computer.
One frequent objection to always-on Internet access is security -- always-on gives hackers time to break into your computer.
CNN: OPINION: The push is on to deploy high-speed, always-on residential Internet access
应用推荐