Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Execs Watching Porn a Leading Cause of Computer Viruses
Live Science ^ | 11/12/2013 | Chad Brooks

Posted on 11/12/2013 7:05:48 PM PST by SeekAndFind

While employees may get the brunt of the blame for security breaches, company leaders are doing their fair share of damage as well, a new study finds.

Research from ThreatTrack Security revealed that 40 percent of security professionals found that a device used by a member of their company's senior leadership team had been infected by malware because of a visit to a pornographic website, and nearly 60 percent of the security professionals surveyed have cleaned malware from a device after an executive clicked on a malicious link or was duped by a phishing email.

In addition, 45 percent of respondents said they have found malware on a senior leader's device because the executive allowed a family member to use it, with one-third of security professionals discovering it on an executive's mobile devices because they installed a malicious app.

(Excerpt) Read more at livescience.com ...


TOPICS: Business/Economy; Computers/Internet; Society
KEYWORDS: computer; porn; virus

1 posted on 11/12/2013 7:05:48 PM PST by SeekAndFind
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

Uh, isn’t there an ipcc get together going on somewhere right now? Maybe someone could check and see how much www.porn action is going on there. LOL! Other than the pornographic disgusting bill of crap they’re tryin’ to unload on the world. Less Australia of course.


2 posted on 11/12/2013 7:08:49 PM PST by rktman (Under my plan(scheme), the price of EVERYTHING will necessarily skyrocket! Period.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Link not working. Execs at internet must be watching porn again.


3 posted on 11/12/2013 7:12:23 PM PST by faithhopecharity
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

That’s true for the spread of computer viruses.

As for the production of computer viruses, it is very often the antivirus companies. I used to work for one, and we document that company’s virus production on our blog.


4 posted on 11/12/2013 7:18:12 PM PST by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hardraade

I heard that of Norton. So it comes preinstalled. And impossible to eradicate for a cabinetmaker.


5 posted on 11/12/2013 7:21:41 PM PST by bigheadfred
[ Post Reply | Private Reply | To 4 | View Replies]

Malware Analysts Say Breaches Are Not Being Disclosed by Their Employers
http://www.freerepublic.com/focus/chat/3090637/posts


6 posted on 11/12/2013 8:05:59 PM PST by SunkenCiv (http://www.freerepublic.com/~mestamachine/)
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

Yeah, that never happens to techies who watch porn at work because they’re smart enough to know which sites are legit porn sites and which ones are fake and are simply meant to be virus honey traps.

Execs on the other hand are too stupid to tell the difference.


7 posted on 11/12/2013 8:20:41 PM PST by catnipman (uil)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Porn, Russian sites, and sometimes enemies embed the virus in friendly sites.
8 posted on 11/12/2013 8:28:35 PM PST by A CA Guy ( God Bless America, God Bless and keep safe our fighting men and women.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Execs are much more likely to have private offices. I suspect it would be even across the board if all employees had private screens.


9 posted on 11/13/2013 12:03:47 AM PST by varyouga
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Research from ThreatTrack Security revealed that 40 percent of security professionals found that a device used by a member of their company's senior leadership team had been infected by malware because of a visit to a pornographic website

Obviously, those security "professionals" don't live up to the moniker. If they'd been on the job, their boss's computer would have been impervious! Why employ them otherwise? The boss could just buy a new computer for much less than they are paid!

10 posted on 11/13/2013 12:15:12 AM PST by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]

To: A CA Guy

Those Ukrainian Shemale Midget Dominatrix Sites will mess up a hard drive something fierce.


11 posted on 11/13/2013 12:39:11 AM PST by Antihero101607
[ Post Reply | Private Reply | To 8 | View Replies]

To: cynwoody
Obviously, those security "professionals" don't live up to the moniker. If they'd been on the job, their boss's computer would have been impervious!

No system is "foolproof" because fools are just too clever.

12 posted on 12/12/2013 6:57:48 AM PST by kobald
[ Post Reply | Private Reply | To 10 | View Replies]

To: varyouga
Execs are much more likely to have private offices. I suspect it would be even across the board if all employees had private screens.

This isn't happening at work, most likely. Everybody has laptops that they bring home these days.

Cruising porn on a work computer, even at home, is a really stupid idea.

13 posted on 12/12/2013 7:01:42 AM PST by dead (I've got my eye out for Mullah Omar.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: bigheadfred; Hardraade

Once some years ago I tried to disable Norton on my PC and it shut down my Internet access. I couldn’t figure out what had happened. Dirty bastards.


14 posted on 12/13/2013 4:22:29 AM PST by Impy (RED=COMMUNIST, NOT REPUBLICAN)
[ Post Reply | Private Reply | To 5 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson