Cracks in computer defenses abound: IBM

Aug 25, 2010
IBM on Wednesday reported that the number of discovered cracks that hackers could exploit in computer software surged in the first half of the year.

IBM on Wednesday reported that the number of discovered cracks that hackers could exploit in computer software surged in the first half of the year.

The number of new "vulnerabilities" documented by an X-Force Research and Development team at IBM increased 36 percent to 4,396 from the same period last year and more than half lacked patches to fix the flaws.

"This year's X-Force report reveals that although threats are on the rise, the industry as a whole is getting much more vigilant about reporting vulnerabilities," said IBM Security Solutions general manager Steve Robinson.

"Threat dynamics continue to multiply and evolve at a furious pace, making it more crucial than ever to look at unfolding trends so we can better prepare our clients for the future."

Software weaknesses were most abundant in Web applications, programs accessed in browsers on the Internet, according to the team. vulnerabilities accounted for 55 percent of the disclosures.

"These figures may only represent the tip of the iceberg of total Web application vulnerabilities that exist, as they do not include custom-developed Web applications," X-Force said in a report of the findings.

Covert tactics on business computers grew in frequency and complexity, according to X-Force.

Hacker attacks using booby-trapped document files "continue to soar" as cyber crooks find new ways to trick users, the report warned.

In a bit of encouraging news, the number of "phishing" attacks in which hackers use email messages to try to dupe people into visiting bogus websites or opening tainted files plunged 82 percent, according to X-Force.

"Despite this drastic decline, financial institutions are still the number one phishing target," the team concluded.

"Credit cards, governmental organizations, online payment institutions and auctions represent the majority of other targets."

Explore further: Review: 'Hearthstone' card game is the real deal

add to favorites email to friend print save as pdf

Related Stories

Research on browser weaknesses triggers attacks

Jul 30, 2008

IBM's X-Force says cyber-criminals are using public research on Web browser weaknesses to launch attacks before most users are even aware of their vulnerability. The mid-year report from the security group indicates that ...

Security gurus see even harsher browser attacks for '07

Jan 31, 2007

Another year, another round of sneaky online attacks. IBM security experts anticipate 2007 will see more sophisticated profit-motivated cyber attacks, including more focus on Web browsers as well as advances in image-based ...

Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are ...

2007 looks like year of 'malware'

Sep 18, 2007

The problem of malicious software or malware appears to be getting exponentially worse. So far this year, IBM Internet Security Systems (ISS) X-Force research and development team has identified more than 210,000 new malware ...

Crooks have new chances as websites grow more complex

May 20, 2010

Cyber crooks are increasingly targeting the growing array of Web applications -- everything from interactive maps to stock tickers -- potentially giving them access to the credit card and Social Security numbers of people ...

More targeted cyber attacks likely in 2006

Jan 23, 2006

The latest security report from IBM foresees cybercrime evolving from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organizations for extortion purposes. IBM Global Business Security Index ...

Recommended for you

Review: 'Hearthstone' card game is the real deal

15 hours ago

Video game publishers don't take many risks with their most popular franchises. You know exactly what you are going to get from a new "Call of Duty" or "Madden NFL" game—it will probably be pretty good, ...

Microsoft expands ad-free Bing search for schools

Apr 23, 2014

Microsoft is expanding a program that gives schools the ability to prevent ads from appearing in search results when they use its Bing search engine. The program, launched in a pilot program earlier this year, is now available ...

Growing app industry has developers racing to keep up

Apr 20, 2014

Smartphone application developers say they are challenged by the glut of apps as well as the need to update their software to keep up with evolving phone technology, making creative pricing strategies essential to finding ...

Android gains in US, basic phones almost extinct

Apr 18, 2014

The Google Android platform grabbed the majority of mobile phones in the US market in early 2014, as consumers all but abandoned non-smartphone handsets, a survey showed Friday.

User comments : 0

More news stories

Genetic code of the deadly tsetse fly unraveled

Mining the genome of the disease-transmitting tsetse fly, researchers have revealed the genetic adaptions that allow it to have such unique biology and transmit disease to both humans and animals.