Cracks in computer defenses abound: IBM

Aug 25, 2010
IBM on Wednesday reported that the number of discovered cracks that hackers could exploit in computer software surged in the first half of the year.

IBM on Wednesday reported that the number of discovered cracks that hackers could exploit in computer software surged in the first half of the year.

The number of new "vulnerabilities" documented by an X-Force Research and Development team at IBM increased 36 percent to 4,396 from the same period last year and more than half lacked patches to fix the flaws.

"This year's X-Force report reveals that although threats are on the rise, the industry as a whole is getting much more vigilant about reporting vulnerabilities," said IBM Security Solutions general manager Steve Robinson.

"Threat dynamics continue to multiply and evolve at a furious pace, making it more crucial than ever to look at unfolding trends so we can better prepare our clients for the future."

Software weaknesses were most abundant in Web applications, programs accessed in browsers on the Internet, according to the team. vulnerabilities accounted for 55 percent of the disclosures.

"These figures may only represent the tip of the iceberg of total Web application vulnerabilities that exist, as they do not include custom-developed Web applications," X-Force said in a report of the findings.

Covert tactics on business computers grew in frequency and complexity, according to X-Force.

Hacker attacks using booby-trapped document files "continue to soar" as cyber crooks find new ways to trick users, the report warned.

In a bit of encouraging news, the number of "phishing" attacks in which hackers use email messages to try to dupe people into visiting bogus websites or opening tainted files plunged 82 percent, according to X-Force.

"Despite this drastic decline, financial institutions are still the number one phishing target," the team concluded.

"Credit cards, governmental organizations, online payment institutions and auctions represent the majority of other targets."

Explore further: Blink, point, solve an equation: Introducing PhotoMath

add to favorites email to friend print save as pdf

Related Stories

Research on browser weaknesses triggers attacks

Jul 30, 2008

IBM's X-Force says cyber-criminals are using public research on Web browser weaknesses to launch attacks before most users are even aware of their vulnerability. The mid-year report from the security group indicates that ...

Security gurus see even harsher browser attacks for '07

Jan 31, 2007

Another year, another round of sneaky online attacks. IBM security experts anticipate 2007 will see more sophisticated profit-motivated cyber attacks, including more focus on Web browsers as well as advances in image-based ...

Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are ...

2007 looks like year of 'malware'

Sep 18, 2007

The problem of malicious software or malware appears to be getting exponentially worse. So far this year, IBM Internet Security Systems (ISS) X-Force research and development team has identified more than 210,000 new malware ...

Crooks have new chances as websites grow more complex

May 20, 2010

Cyber crooks are increasingly targeting the growing array of Web applications -- everything from interactive maps to stock tickers -- potentially giving them access to the credit card and Social Security numbers of people ...

More targeted cyber attacks likely in 2006

Jan 23, 2006

The latest security report from IBM foresees cybercrime evolving from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organizations for extortion purposes. IBM Global Business Security Index ...

Recommended for you

Intelligent materials that work in space

45 minutes ago

ARQUIMEA, a company that began in the Business Incubator in the Science Park of the Universidad Carlos III de Madrid, will be testing technology it has developed in the International Space Station. The technology ...

How to find a submarine

3 hours ago

Das Boot, The Hunt for Red October, The Bedford Incident, We Dive At Dawn: films based on submariners' experience reflect the tense and unusual nature of undersea warfare – where it is often not how well ...

User comments : 0