Sunday, October 2, 2011

IBM Security Report: More complex, more mobile and more targeted attacks

IBM Security Report: More complex, more mobile and more targeted attacks
"For years, the industry is waiting for that malware is a real issue for the mobile space," said Tom Cross, manager of Threat Intelligence and Strategy at IBM X-Force. Now it seems so far. His assessment of the expert concerns from the results of the recently published IBM X-Force report, which is fully available only on registration.
According to this mainly plays a role that mobile phone manufacturers are too slow with their security updates, but at the same time more and more frolic and private devices in corporate networks - key word "Bring your own device". This in turn means that the market for malicious code developers will be more interesting. The majority of malware today come primarily through third-party app stores into the circulation. The malicious programs are mainly targeted at SMS premium services, whose fees are then pushed under the attacked, as well as the collection of personal information that an attacker can abuse as a result of phishing attacks and identity thefts. The IBM researchers predict based on current numbers, a doubling of mobile attacks until the end of the year.
Further reported that X-Force team a tripling of the percentage of critical vulnerabilities. Increasingly complex attacks can be observed, particularly with objective information on strategic. Using sophisticated methods to try and camouflage attacker to gain access to critical networks. This threat refers to the X-Force team as "Advanced Persistent Threats" (short APTs). The so-called "whaling", the attackers set their methods, especially against the "big fish" one from the management level of enterprises that have access to important data. Careful spying followed by targeted phishing campaigns should lead us to success.
The experts also were able to observe attacks with political backgrounds, done by so-called "hacktivists", and a quadrupling of the number of anonymous proxies. This trend should be monitored closely because, as the X-Force team, these servers are often used to hide potentially offensive content.
However, some positive results, the report has noted. For example, the number of Webschwachstellen fell in the first half of 49 to 37 percent and went back for the first time in five years. Web browsers also reported significantly less vulnerabilities than in past years. And finally, through the destruction of some of botnets, the amount of spam and phishing attacks declined sharply. The results of IBM's reports are based on studies of publicly known security incidents and the analysis of an average of 12 billion security events every day since the beginning of this year.

"For years, the industry is waiting for that malware is a real issue for the mobile space," said Tom Cross, manager of Threat Intelligence and Strategy at IBM X-Force. Now it seems so far. His assessment of the expert concerns from the results of the recently published IBM X-Force report, which is fully available only on registration.
According to this mainly plays a role that mobile phone manufacturers are too slow with their security updates, but at the same time more and more frolic and private devices in corporate networks - key word "Bring your own device". This in turn means that the market for malicious code developers will be more interesting. The majority of malware today come primarily through third-party app stores into the circulation. The malicious programs are mainly targeted at SMS premium services, whose fees are then pushed under the attacked, as well as the collection of personal information that an attacker can abuse as a result of phishing attacks and identity thefts. The IBM researchers predict based on current numbers, a doubling of mobile attacks until the end of the year.
Further reported that X-Force team a tripling of the percentage of critical vulnerabilities. Increasingly complex attacks can be observed, particularly with objective information on strategic. Using sophisticated methods to try and camouflage attacker to gain access to critical networks. This threat refers to the X-Force team as "Advanced Persistent Threats" (short APTs). The so-called "whaling", the attackers set their methods, especially against the "big fish" one from the management level of enterprises that have access to important data. Careful spying followed by targeted phishing campaigns should lead us to success.
The experts also were able to observe attacks with political backgrounds, done by so-called "hacktivists", and a quadrupling of the number of anonymous proxies. This trend should be monitored closely because, as the X-Force team, these servers are often used to hide potentially offensive content.
However, some positive results, the report has noted. For example, the number of Webschwachstellen fell in the first half of 49 to 37 percent and went back for the first time in five years. Web browsers also reported significantly less vulnerabilities than in past years. And finally, through the destruction of some of botnets, the amount of spam and phishing attacks declined sharply. The results of IBM's reports are based on studies of publicly known security incidents and the analysis of an average of 12 billion security events every day since the beginning of this year.

No comments:

Post a Comment