Instrumented Interconnecteds Intelligent

Posted by

Post feed

RSS 2.0

By Clinton McFadden, IBM X-Force Research and Development

For security officials, the first half of 2012 was marked by intelligence and sophistication – which, when it comes to securing a computer network, are not always positive traits. Yesterday IBM released the results of the X-Force 2012 Mid-Year Trend and Risk Report. The report highlights a sharp increase in browser-related exploits, weaknesses around password security, and growing operational challenges in the adoption mobile “bring your own device (BYOD) programs and policies since last year. In fact, half of all the Chief Information Security Officers interviewed indicated that mobile BYOD security is their greatest near-term technology concern.

The continued growth of both persistent and emerging attacks makes it all the more critical for businesses across all industries to bolster their security efforts. As part of ongoing efforts to assist global clients and invest in growth markets IBM this week announced a new Security Operations Center in Wroclaw, Poland providing real-time analysis and security notifications that keep businesses ahead of the most pressing and progressively complex security threats.

Here are the major trends we are seeing based on our analysis:

  • Back to basics – password security: When you consider the increased number of social networks people participate in – from the more personal ones, to professional sites – email addresses and passwords are the common denominators in managing online identity. In 2012, we’ve seen numerous headlines announcing usernames and passwords pulled from popular sites and posted publicly – and for people who use the same password across multiple accounts – from social sites to corporate logins to banking credentials — this kind of breach can have a dangerous ripple effect. To prevent these problems, end users should implement a password or passphrase, which is a combination of words or even an entire sentence that makes the password longer, more complex and therefore more difficult to crack.
  • It’s a mobile world: As mobile continues to become more pervasive in our daily lives, cyber criminals are (not surprisingly) following suit, causing mobile security to become the next big IT headache. The good news on this front is that IBM X-Force research found that mobile vulnerabilities and exploits decreased in the first part of 2012 – to the lowest levels since 2008 – likely due to the fact that developers are investing in security enhancements as well as in-house discoveries of vulnerabilities. However, there are still a number of smart phone users falling victim to SMS (i.e. text message) scams. Many times, these are a direct result of seemingly legitimate applications that actually contain malicious code.
  • Playing in the sandbox: On a positive note, the report found that there was a drop in PDF vulnerability disclosures during the first six months of the year, thanks in large part to sandboxing technology. This technology works by isolating an application from the rest of the system, so that if compromised, the attacker code running within the application is limited to what it can do or what it can access. However, motivated attackers will always try to find ways to break out of a sandbox – so it’s important to remain vigilant despite this promising new approach.

Continue the conversation at the IBM Institute for Advanced Security site.

Bookmark and Share

Previous post

Next post

December 29, 2015
2:56 am

At Oregon Exercise Therapy we specialize at checking out and also treating your
whole body,not merely your symptom..

Posted by: postural alignment
December 27, 2015
10:20 pm

My financial guy told me: If you have a property settlement
agreement with a former spouse, setting forth an expectation that the other partner pays
all or part of your children’s expenses or alimony, factor this into your life
insurance decisions. Should your former spouse die,
unless it is clearly in the estate documentation, there is no requirement that the estate will continue to pay
those expenses. Instead, it may make sense to insure your ex spouse
and list yourself as beneficiary, in order to protect yourself and your children.

Posted by: Dorthea
December 17, 2015
8:52 pm

Very good article! We are linking to this great article
on our website. Keep up the good writing.

Posted by: black hat seo tools download
September 23, 2015
7:26 pm

It’s fantastic that you are getting ideas from this piece
of writing as well as from our discussion made at this place.

Posted by: roulette betting strategy
September 17, 2015
11:10 am

Awesome post.

Posted by: Marita Engebretsen
September 3, 2015
9:50 pm

Hello there! I ccould have sworn I’ve been to this
blog before but after looking at many of the posts I realized it’s new to me.
Anyways, I’m certainly delighted I stumbled upon it and I’ll
be book-marking it and checking back frequently!

Posted by: miami foreclosures
April 28, 2015
2:22 am

So, if you have a Front – Page Shared Border, it will still appear on your
website in Expression and oon the Internet, but you will not be able tto change the border if
need be. *Type of Tax involved: Estate tax, Gift tax and Capital Gains tax.
The first tip of contact with discussing whether
their home birth is easiest for you is usually your midwife.

Posted by:
March 14, 2015
5:36 pm

2004 & Barling. Igf 1 Severe Factor Deer Spray can be a highly filtered liquid deer antler velvet extract.

Posted by: Charolette
March 14, 2015
4:44 pm

2004 & Barling. Igf 1 Extreme Factor Matrix Deer Spray is just a very purified fluid deer antler velvet

Posted by: Bernd
January 11, 2015
10:36 am

Hi, i believe that i noticed you visited my web site thus i came to return the desire?.I’m
trying to to find issues to improve my site!I guess its
ok to make use of some of your concepts!!

Posted by: interior designs
October 19, 2014
3:22 pm

What’s up Dear, are you in fact visiting this website on a regular basis, if so after that you will without doubt get nice know-how.

Posted by: Rozanne Strausner
October 16, 2014
2:39 pm

May I ask what you do to draw new visitors to your site?
Can you tell me how did you acquire a lot of traffic?
Could you also tell me, how did you brand your website and
how did you ensure visitors?

Posted by: Ways to develop an iPhone app
September 21, 2014
1:17 am

Thanks for sharing your thoughts on computers ibm. Regards

Posted by:
September 18, 2014
5:39 pm

How To Clean Wedding Shoes – Mix a mild fabric
detergent with water mixture together in a small bowl.
From the ordinary views we are able to make sure
that the girls have deep love jewelers, various fashion clothes and bags and also ornaments and bedecks.
With the years, women have actually pertained to
cherish these kind of uncomplicated relaxed as well as exquisite boots.

Posted by: online trend shop
September 1, 2014
3:25 pm

Excellent blog here! Also your web site loads up very fast!
What host are you using? Can I get your affiliate link to your host?
I wish my website loaded up as quickly as yours lol

Posted by: new games download for pc free
August 20, 2014
3:31 am

I’ve rwad a few good stuff here. Definitely value bookmarkingg for
revisiting. I wonder how much attempt you put to make this sort of
great informative web site.

Posted by:
August 3, 2014
9:21 pm

This web site truly has all the information and acts I
wanted about this subject and didn’t know who tto ask.

Posted by: Barb
May 14, 2014
8:43 pm
April 24, 2014
2:40 am

What’s Going down i’m new to this, I stumbled upon this I’ve discovered It positively useful
and it has aided me out loads. I’m hoping to give a contribution & aid different users like its
aided me. Good job.

Posted by: ask fm gift friend location hack
April 2, 2014
9:42 am

We’re a gaggle of volunteers and starting a brand new scheme in
our community. Your web site provided us with useful information
to work on. You’ve done a formidable process and our entire community will likely be grateful to you.

Posted by: zombie lane hack coins
March 14, 2014
5:31 pm

I’m really enjoying the design and layout of your website. It’s a very
easy on the eyes which makes it much more enjoyable for
me to come here and visit more often. Did you hire out a developer to create your theme?
Excellent work!

Posted by: deer hunter 2014 hack tool apk
March 14, 2014
2:49 am

Hi! Do you know if they make any plugins to help with SEO?
I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good success.
If you know of any please share. Cheers!

Posted by: how to stop plantar fasciitis
December 8, 2013
2:47 am

First time visit here and have your terrific article. May I have a copy of the report?

Posted by: Aron Litzenberg
October 5, 2013
2:43 am

Before i read this article i had no idea what’s IBM Security , now i get some idea about it ,thank for write this article and post it out to share with everyone , you are so kind

Posted by: pincess-prom-dress
August 8, 2013
10:50 am

Definitely, what a fantastic blog and educative posts, I definitely will bookmark your blog.All the Best!

Posted by: Party Dress
July 29, 2013
10:41 am

Can I just say what a reduction to search out someone who really knows what theyre talking about on the internet. You positively know how to bring a difficulty to gentle and make it important. More folks must read this and understand this facet of the story. I cant imagine youre not more in style because you positively have the gift.

Posted by: Erin Jakab
July 28, 2013
9:31 am

There are certainly a number of particulars like that to take into consideration. That is a nice level to carry up. I offer the ideas above as normal inspiration however clearly there are questions just like the one you carry up the place a very powerful factor will probably be working in honest good faith. I don?t know if best practices have emerged round issues like that, however I’m sure that your job is clearly recognized as a good game. Each girls and boys really feel the affect of only a second�s pleasure, for the remainder of their lives.

Posted by: Omer Halston
July 28, 2013
3:50 am

There are actually a whole lot of particulars like that to take into consideration. That could be a nice level to convey up. I provide the ideas above as common inspiration however clearly there are questions just like the one you convey up the place an important factor will likely be working in sincere good faith. I don?t know if finest practices have emerged round issues like that, however I’m certain that your job is clearly recognized as a good game. Each girls and boys really feel the influence of only a second�s pleasure, for the remainder of their lives.

Posted by: Ambrose Menear
July 27, 2013
9:25 am

I and my pals came analyzing the great items found on your site and so the sudden came up with a terrible suspicion I never expressed respect to the blog owner for those tips. These people had been for that reason very interested to read all of them and have now truly been taking pleasure in these things. I appreciate you for turning out to be so considerate and also for deciding upon these kinds of really good information millions of individuals are really wanting to discover. My sincere regret for not saying thanks to sooner.

Posted by: Student Travel
July 27, 2013
8:18 am

Thank you for any other magnificent article. Where else may just anyone get that type of info in such a perfect approach of writing? I’ve a presentation next week, and I’m at the look for such information.

Posted by: Interior Paint
July 19, 2013
6:36 pm

After I originally commented I clicked the -Notify me when new comments are added- checkbox and now each time a comment is added I get four emails with the same comment. Is there any approach you can remove me from that service? Thanks!

Posted by: Erik Ardelean
May 27, 2013
8:40 am

Thanks for sharing about this post regarding IBM security report shows rising targeted attacks on browsers.

Posted by: Appin Security
1 Trackback
September 24, 2012
12:58 pm

[...] from our IBM Security colleagues. For more insight to the report, check out this article, IBM Security Report Shows Targeted Attacks Rise, from Clinton McFadden, IBM X-Force Research and Development, on the Smarter Planet [...]

Posted by: Key Highlights in the IBM X-Force 2012 Trend & Risk Report - Leslie Horacek - Expert Blogs - IBM Institute for Advanced Security
Post a Comment