After reading about the latest hack-attack on the State of Nevada’s (USA) general fund bank account and how “…conventional anti-virus and signature detection IT security software – as was used on the computer – is no longer enough.” , the following started to come to mind and they suddenly all added up.
I would like to point out here that the issue that anti-virus software and signature detection systems are not up to detecting malicious software is highlighted very often in the news, Blogs [2, 3, 4, 5, 6] and in the latest paper from Google’s Security Team. If we relate these facts with the fact that Microsoft is limiting our power over the Operating System:
“The software is licensed, not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the software only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the software that only allow you to use it in certain ways.” – Microsoft Windows Vista Business License 
Eventually all these incidences, obviously, will just convince everyone that the Trusted Computing [9, 10] paradigm is a good idea and should be pushed forward.
In the end we will limit our freedom to run programs freely and we will have some non-profitable organisation tell us what programs are safe to run; in order to avoid cyber criminals from infecting our machines. It is a weird trade off. Then again the Internet was built for the free exchange of ideas and documents and that is being taken away too.
‘Safely’ surf the internet through a Virtualisation solution provided by VMware: Browser Appliance Virus-safe Internet browser – http://www.vmware.com/vmtn/appliances/directory/browserapp.html
Also mentioned in a previous blog posting http://isrg.weblog.glam.ac.uk/posts/2005/12/14/vmware-and-secure-web-browsing
 Computer hackers take US city for $450,000 – http://www.net-security.org/secworld.php?id=5234
 The slow death of AV technology
 Bots on your net? Look twice
 Malware report on BankFake.F trojan, MSNHideOptions and Grogotix worms – http://www.net-security.org/virus_news.php?id=815
 Google acquires ‘sandbox’ technology for secure browsing
 Hackers load malware onto Mercury music award site
 The Ghost in the Browser Analysis of Web-based Malware, Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu, USENIX Workshop on Hot Topics in Understanding Botnets, April 2007. – http://www.usenix.org/events/hotbots07/tech/full_papers/provos/provos.pdf
 Microsoft Windows Vista Business License – http://www.microsoft.com/about/legal/useterms/default.aspx
 Trusted Computing (Wikipedia) – http://en.wikipedia.org/wiki/Trusted_computing
 Trusted Computing Group – https://www.trustedcomputinggroup.org/home
 Net censorship growing worldwide – http://www.theregister.co.uk/2007/05/18/net_censorship/