An explosion of breaches has opened 2011 with continuing, near daily new reports, marking this year as “The Year of the Security Breach.” These breaches have been not able not just for their frequency, but for the presumed operational competency of many of the victims. The environment is changing: the boundaries of business infrastructure are being extended – and sometimes obliterated – by the emergence of cloud, mobility, social business, big data and more, while the attacks are getting more and more sophisticated, often showing evidence of extensive pre-operation intelligence collection and careful, patient, long term planning. The repercussions of these attacks are large enough to move security discussions out of technical circles and into the board room.
Paradoxically, a lot of improvement in the fight to secure the Internet has been shown so far this year…with many vulnerability and attack statistics significantly improving. So the good guys are winning some key battles, but the fight is far from over. The bad guys are simply moving on to new attack surfaces, and one of those new battlefields is smartphones. The rapid proliferation of these devices combined with a consolidation of operating systems has caused attackers to finally warm up to the opportunities these devices represent. As such, IBM X-Force research is predicting that exploits targeting vulnerabilities that affect Mobile operating systems will more than double from 2010.
In this new, more complex environment, compliance is simply not enough. Read the report to find out what the IBM X-Force Research and Development team would do if we were managing your network.
And also…the SQL slammer worm all but disappeared in March. Is this a good thing? IBM X-Force Research has determined that the possible cause of the SQL Slammer disappearance was a Black Knight creating a botnet. Read about it in the full report.
source
Refer:
news.softpedia.com
Paradoxically, a lot of improvement in the fight to secure the Internet has been shown so far this year…with many vulnerability and attack statistics significantly improving. So the good guys are winning some key battles, but the fight is far from over. The bad guys are simply moving on to new attack surfaces, and one of those new battlefields is smartphones. The rapid proliferation of these devices combined with a consolidation of operating systems has caused attackers to finally warm up to the opportunities these devices represent. As such, IBM X-Force research is predicting that exploits targeting vulnerabilities that affect Mobile operating systems will more than double from 2010.
In this new, more complex environment, compliance is simply not enough. Read the report to find out what the IBM X-Force Research and Development team would do if we were managing your network.
And also…the SQL slammer worm all but disappeared in March. Is this a good thing? IBM X-Force Research has determined that the possible cause of the SQL Slammer disappearance was a Black Knight creating a botnet. Read about it in the full report.
source
Refer:
news.softpedia.com