Throwback Thursday: A troubled world

Posted by   Helen Martin on   Feb 9, 2017

In early 1991, the world was a troubled place – President George H. W. Bush had just announced the start of military Operation Desert Storm and conflict and violence were being reported globally on a daily basis. With this as a backdrop, the world of "indiscriminate" computer viruses which "victimise in a random and unpredictable manner" seemed relatively trivial to then Editor of VB, Edward Wilding, who, for this reason, suggested shelving references to the 'computer virus war' or '[cyber] warfare'.

In an editorial piece for VB, while hinting at greater, more destructive possibilities for the use of malware, Edward Wilding called for virus writers to take responsibility for their actions: "The people who develop and propagate viruses should, at the very least, realise that they are responsible for impeding other peoples' freedom, creativity and progress indiscriminately."

Throwback-Thursday-VB.jpg

Today, the world is still a troubled place, with conflict, violence and uncertainty pervading in far too many corners of the globe. However, we are now also aware of the fact that malware really can be used in warfare, with governments known to have colluded on pieces of code designed to infiltrate industrial infrastructure and cause damage and disruption in other nations.

Actual cyber warfare, combined with the high-value industry that malware has become (estimated costs to the global economy running to billions of dollars), make the threat landscape very different from the one VB's editor wrote about 26 years ago, and we now face some very different challenges. Nevertheless, his sage words still ring true: "every responsible course of action by every individual, whatever his particular field of interest or knowledge, serves to lessen the world's problems in some small but significant way".

Read Edward's observations here in HTML-format, or download the article here as a PDF.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2017 paper: Nine circles of Cerber

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool…

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Security Planner gives security advice based on your threat model

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.