Instrumented Interconnecteds Intelligent

Posted by
in

Post feed

RSS 2.0

By Clinton McFadden, IBM X-Force Research and Development

For security officials, the first half of 2012 was marked by intelligence and sophistication – which, when it comes to securing a computer network, are not always positive traits. Yesterday IBM released the results of the X-Force 2012 Mid-Year Trend and Risk Report. The report highlights a sharp increase in browser-related exploits, weaknesses around password security, and growing operational challenges in the adoption mobile “bring your own device (BYOD) programs and policies since last year. In fact, half of all the Chief Information Security Officers interviewed indicated that mobile BYOD security is their greatest near-term technology concern.

The continued growth of both persistent and emerging attacks makes it all the more critical for businesses across all industries to bolster their security efforts. As part of ongoing efforts to assist global clients and invest in growth markets IBM this week announced a new Security Operations Center in Wroclaw, Poland providing real-time analysis and security notifications that keep businesses ahead of the most pressing and progressively complex security threats.

Here are the major trends we are seeing based on our analysis:

  • Back to basics – password security: When you consider the increased number of social networks people participate in – from the more personal ones, to professional sites – email addresses and passwords are the common denominators in managing online identity. In 2012, we’ve seen numerous headlines announcing usernames and passwords pulled from popular sites and posted publicly – and for people who use the same password across multiple accounts – from social sites to corporate logins to banking credentials — this kind of breach can have a dangerous ripple effect. To prevent these problems, end users should implement a password or passphrase, which is a combination of words or even an entire sentence that makes the password longer, more complex and therefore more difficult to crack.
  • It’s a mobile world: As mobile continues to become more pervasive in our daily lives, cyber criminals are (not surprisingly) following suit, causing mobile security to become the next big IT headache. The good news on this front is that IBM X-Force research found that mobile vulnerabilities and exploits decreased in the first part of 2012 – to the lowest levels since 2008 – likely due to the fact that developers are investing in security enhancements as well as in-house discoveries of vulnerabilities. However, there are still a number of smart phone users falling victim to SMS (i.e. text message) scams. Many times, these are a direct result of seemingly legitimate applications that actually contain malicious code.
  • Playing in the sandbox: On a positive note, the report found that there was a drop in PDF vulnerability disclosures during the first six months of the year, thanks in large part to sandboxing technology. This technology works by isolating an application from the rest of the system, so that if compromised, the attacker code running within the application is limited to what it can do or what it can access. However, motivated attackers will always try to find ways to break out of a sandbox – so it’s important to remain vigilant despite this promising new approach.

Continue the conversation at the IBM Institute for Advanced Security site.

Bookmark and Share

Previous post

Next post

22 Comments
 
October 19, 2014
3:22 pm

What’s up Dear, are you in fact visiting this website on a regular basis, if so after that you will without doubt get nice know-how.


Posted by: Rozanne Strausner
 
October 16, 2014
2:39 pm

May I ask what you do to draw new visitors to your site?
Can you tell me how did you acquire a lot of traffic?
Could you also tell me, how did you brand your website and
how did you ensure visitors?


Posted by: Ways to develop an iPhone app
 
September 21, 2014
1:17 am

Thanks for sharing your thoughts on computers ibm. Regards


Posted by: http://tattoosbygarrett.com/
 
September 18, 2014
5:39 pm

How To Clean Wedding Shoes – Mix a mild fabric
detergent with water mixture together in a small bowl.
From the ordinary views we are able to make sure
that the girls have deep love jewelers, various fashion clothes and bags and also ornaments and bedecks.
With the years, women have actually pertained to
cherish these kind of uncomplicated relaxed as well as exquisite boots.


Posted by: online trend shop
 
September 1, 2014
3:25 pm

Excellent blog here! Also your web site loads up very fast!
What host are you using? Can I get your affiliate link to your host?
I wish my website loaded up as quickly as yours lol


Posted by: new games download for pc free
 
August 20, 2014
3:31 am

I’ve rwad a few good stuff here. Definitely value bookmarkingg for
revisiting. I wonder how much attempt you put to make this sort of
great informative web site.


Posted by: http://www.cession-parts-sci.fr/
 
August 3, 2014
9:21 pm

This web site truly has all the information and acts I
wanted about this subject and didn’t know who tto ask.


Posted by: Barb
 
May 14, 2014
8:43 pm
April 24, 2014
2:40 am

What’s Going down i’m new to this, I stumbled upon this I’ve discovered It positively useful
and it has aided me out loads. I’m hoping to give a contribution & aid different users like its
aided me. Good job.


Posted by: ask fm gift friend location hack
 
April 2, 2014
9:42 am

We’re a gaggle of volunteers and starting a brand new scheme in
our community. Your web site provided us with useful information
to work on. You’ve done a formidable process and our entire community will likely be grateful to you.


Posted by: zombie lane hack coins
 
March 14, 2014
5:31 pm

I’m really enjoying the design and layout of your website. It’s a very
easy on the eyes which makes it much more enjoyable for
me to come here and visit more often. Did you hire out a developer to create your theme?
Excellent work!


Posted by: deer hunter 2014 hack tool apk
 
March 14, 2014
2:49 am

Hi! Do you know if they make any plugins to help with SEO?
I’m trying to get my blog to rank for some targeted keywords but I’m not seeing very good success.
If you know of any please share. Cheers!


Posted by: how to stop plantar fasciitis
 
December 8, 2013
2:47 am

First time visit here and have your terrific article. May I have a copy of the report?


Posted by: Aron Litzenberg
 
October 5, 2013
2:43 am

Before i read this article i had no idea what’s IBM Security , now i get some idea about it ,thank for write this article and post it out to share with everyone , you are so kind


Posted by: pincess-prom-dress
 
August 8, 2013
10:50 am

Definitely, what a fantastic blog and educative posts, I definitely will bookmark your blog.All the Best!


Posted by: Party Dress
 
July 29, 2013
10:41 am

Can I just say what a reduction to search out someone who really knows what theyre talking about on the internet. You positively know how to bring a difficulty to gentle and make it important. More folks must read this and understand this facet of the story. I cant imagine youre not more in style because you positively have the gift.


Posted by: Erin Jakab
 
July 28, 2013
9:31 am

There are certainly a number of particulars like that to take into consideration. That is a nice level to carry up. I offer the ideas above as normal inspiration however clearly there are questions just like the one you carry up the place a very powerful factor will probably be working in honest good faith. I don?t know if best practices have emerged round issues like that, however I’m sure that your job is clearly recognized as a good game. Each girls and boys really feel the affect of only a second�s pleasure, for the remainder of their lives.


Posted by: Omer Halston
 
July 28, 2013
3:50 am

There are actually a whole lot of particulars like that to take into consideration. That could be a nice level to convey up. I provide the ideas above as common inspiration however clearly there are questions just like the one you convey up the place an important factor will likely be working in sincere good faith. I don?t know if finest practices have emerged round issues like that, however I’m certain that your job is clearly recognized as a good game. Each girls and boys really feel the influence of only a second�s pleasure, for the remainder of their lives.


Posted by: Ambrose Menear
 
July 27, 2013
9:25 am

I and my pals came analyzing the great items found on your site and so the sudden came up with a terrible suspicion I never expressed respect to the blog owner for those tips. These people had been for that reason very interested to read all of them and have now truly been taking pleasure in these things. I appreciate you for turning out to be so considerate and also for deciding upon these kinds of really good information millions of individuals are really wanting to discover. My sincere regret for not saying thanks to sooner.


Posted by: Student Travel
 
July 27, 2013
8:18 am

Thank you for any other magnificent article. Where else may just anyone get that type of info in such a perfect approach of writing? I’ve a presentation next week, and I’m at the look for such information.


Posted by: Interior Paint
 
July 19, 2013
6:36 pm

After I originally commented I clicked the -Notify me when new comments are added- checkbox and now each time a comment is added I get four emails with the same comment. Is there any approach you can remove me from that service? Thanks!


Posted by: Erik Ardelean
 
May 27, 2013
8:40 am

Thanks for sharing about this post regarding IBM security report shows rising targeted attacks on browsers.


Posted by: Appin Security
 
1 Trackback
 
September 24, 2012
12:58 pm

[...] from our IBM Security colleagues. For more insight to the report, check out this article, IBM Security Report Shows Targeted Attacks Rise, from Clinton McFadden, IBM X-Force Research and Development, on the Smarter Planet [...]


Posted by: Key Highlights in the IBM X-Force 2012 Trend & Risk Report - Leslie Horacek - Expert Blogs - IBM Institute for Advanced Security
 
Post a Comment