Businesses Warned: Open-Source Risky
A security firm has warned businesses that using open-source software could put them at risk. A new study carried out by security consultant Larry Suto for Fortify claims people developing open-source software simply don't meet the security standards that would be expected of commercial software companies.
Open-source software involves the source code behind the software being publicly available. In most cases there is no charge to use, distribute or modify the software. Indeed, many developers and enthusiasts will share ways to improve the software or adapt it for different tasks. The best known open-source software is the Linux operating system, though there are also plenty of programs published as open-source. Supporters say such software is a cheaper (and sometimes free) alternative to products from name brand companies like Microsoft.
In a statement, Suto and Fortify had this to say about open-source:
"Serious security threats stemming from numerous application vulnerabilities are a direct result of poor or non-existent security processes." (Source: networkworld.com)
The study criticises open-source groups for failing to use in-house security experts, not taking care of security flaws when they release updated editions, and not using tools designed to track down security-related bugs. (There is some self-interest here as Fortify manufacturers such tools.)
The report did highlight Mozilla as an example of good practice. The firm, which makes the Firefox Internet browser, recently hired a security consultant.
According to Fortify, the report shouldn't mean open-source software becomes a no-no. Instead, companies using it should budget for spending time and money to assess the software they are planning to use and make sure there are no security risks. (Source: linuxinsider.com)
The biggest problem appears to be the downside of one of open-source's major benefits: the co-operation between many different developers. While this can make software more creative or efficient, it means there's no formal security-vetting process found with commercial development.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.