Instrumented Interconnecteds Intelligent

Posted by
in

Post feed

RSS 2.0

By Clinton McFadden, IBM X-Force Research and Development

For security officials, the first half of 2012 was marked by intelligence and sophistication – which, when it comes to securing a computer network, are not always positive traits. Yesterday IBM released the results of the X-Force 2012 Mid-Year Trend and Risk Report. The report highlights a sharp increase in browser-related exploits, weaknesses around password security, and growing operational challenges in the adoption mobile “bring your own device (BYOD) programs and policies since last year. In fact, half of all the Chief Information Security Officers interviewed indicated that mobile BYOD security is their greatest near-term technology concern.

The continued growth of both persistent and emerging attacks makes it all the more critical for businesses across all industries to bolster their security efforts. As part of ongoing efforts to assist global clients and invest in growth markets IBM this week announced a new Security Operations Center in Wroclaw, Poland providing real-time analysis and security notifications that keep businesses ahead of the most pressing and progressively complex security threats.

Here are the major trends we are seeing based on our analysis:

  • Back to basics – password security: When you consider the increased number of social networks people participate in – from the more personal ones, to professional sites – email addresses and passwords are the common denominators in managing online identity. In 2012, we’ve seen numerous headlines announcing usernames and passwords pulled from popular sites and posted publicly – and for people who use the same password across multiple accounts – from social sites to corporate logins to banking credentials — this kind of breach can have a dangerous ripple effect. To prevent these problems, end users should implement a password or passphrase, which is a combination of words or even an entire sentence that makes the password longer, more complex and therefore more difficult to crack.
  • It’s a mobile world: As mobile continues to become more pervasive in our daily lives, cyber criminals are (not surprisingly) following suit, causing mobile security to become the next big IT headache. The good news on this front is that IBM X-Force research found that mobile vulnerabilities and exploits decreased in the first part of 2012 – to the lowest levels since 2008 – likely due to the fact that developers are investing in security enhancements as well as in-house discoveries of vulnerabilities. However, there are still a number of smart phone users falling victim to SMS (i.e. text message) scams. Many times, these are a direct result of seemingly legitimate applications that actually contain malicious code.
  • Playing in the sandbox: On a positive note, the report found that there was a drop in PDF vulnerability disclosures during the first six months of the year, thanks in large part to sandboxing technology. This technology works by isolating an application from the rest of the system, so that if compromised, the attacker code running within the application is limited to what it can do or what it can access. However, motivated attackers will always try to find ways to break out of a sandbox – so it’s important to remain vigilant despite this promising new approach.

Continue the conversation at the IBM Institute for Advanced Security site.

Bookmark and Share

Previous post

Next post

13 Comments
 
April 2, 2014
9:42 am

We’re a gaggle of volunteers and starting a brand new scheme in
our community. Your web site provided us with useful information
to work on. You’ve done a formidable process and our entire community will likely be grateful to you.


Posted by: zombie lane hack coins
 
March 14, 2014
5:31 pm

I’m really enjoying the design and layout of your website. It’s a very
easy on the eyes which makes it much more enjoyable for
me to come here and visit more often. Did you hire out a developer to create your theme?
Excellent work!


Posted by: deer hunter 2014 hack tool apk
 
March 14, 2014
2:49 am

Hi! Do you know if they make any plugins to help with SEO?
I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good success.
If you know of any please share. Cheers!


Posted by: how to stop plantar fasciitis
 
December 8, 2013
2:47 am

First time visit here and have your terrific article. May I have a copy of the report?


Posted by: Aron Litzenberg
 
October 5, 2013
2:43 am

Before i read this article i had no idea what’s IBM Security , now i get some idea about it ,thank for write this article and post it out to share with everyone , you are so kind


Posted by: pincess-prom-dress
 
August 8, 2013
10:50 am

Definitely, what a fantastic blog and educative posts, I definitely will bookmark your blog.All the Best!


Posted by: Party Dress
 
July 29, 2013
10:41 am

Can I just say what a reduction to search out someone who really knows what theyre talking about on the internet. You positively know how to bring a difficulty to gentle and make it important. More folks must read this and understand this facet of the story. I cant imagine youre not more in style because you positively have the gift.


Posted by: Erin Jakab
 
July 28, 2013
9:31 am

There are certainly a number of particulars like that to take into consideration. That is a nice level to carry up. I offer the ideas above as normal inspiration however clearly there are questions just like the one you carry up the place a very powerful factor will probably be working in honest good faith. I don?t know if best practices have emerged round issues like that, however I’m sure that your job is clearly recognized as a good game. Each girls and boys really feel the affect of only a second�s pleasure, for the remainder of their lives.


Posted by: Omer Halston
 
July 28, 2013
3:50 am

There are actually a whole lot of particulars like that to take into consideration. That could be a nice level to convey up. I provide the ideas above as common inspiration however clearly there are questions just like the one you convey up the place an important factor will likely be working in sincere good faith. I don?t know if finest practices have emerged round issues like that, however I’m certain that your job is clearly recognized as a good game. Each girls and boys really feel the influence of only a second�s pleasure, for the remainder of their lives.


Posted by: Ambrose Menear
 
July 27, 2013
9:25 am

I and my pals came analyzing the great items found on your site and so the sudden came up with a terrible suspicion I never expressed respect to the blog owner for those tips. These people had been for that reason very interested to read all of them and have now truly been taking pleasure in these things. I appreciate you for turning out to be so considerate and also for deciding upon these kinds of really good information millions of individuals are really wanting to discover. My sincere regret for not saying thanks to sooner.


Posted by: Student Travel
 
July 27, 2013
8:18 am

Thank you for any other magnificent article. Where else may just anyone get that type of info in such a perfect approach of writing? I’ve a presentation next week, and I’m at the look for such information.


Posted by: Interior Paint
 
July 19, 2013
6:36 pm

After I originally commented I clicked the -Notify me when new comments are added- checkbox and now each time a comment is added I get four emails with the same comment. Is there any approach you can remove me from that service? Thanks!


Posted by: Erik Ardelean
 
May 27, 2013
8:40 am

Thanks for sharing about this post regarding IBM security report shows rising targeted attacks on browsers.


Posted by: Appin Security
 
1 Trackback
 
September 24, 2012
12:58 pm

[...] from our IBM Security colleagues. For more insight to the report, check out this article, IBM Security Report Shows Targeted Attacks Rise, from Clinton McFadden, IBM X-Force Research and Development, on the Smarter Planet [...]


Posted by: Key Highlights in the IBM X-Force 2012 Trend & Risk Report - Leslie Horacek - Expert Blogs - IBM Institute for Advanced Security
 
Post a Comment