Significant Drop in Spam and Browser Flaws: IBM X-Force
A significant reduction in spam and web browser vulnerabilities has been reported by IBM in its recent report "X-Force 2011 Mid-Year Trend and Risk Report."
A decrease in severe vulnerabilities, specially grafted for exploiting remote attacks and malware installation has also been noticed by the company. According to the report, half of the security vulnerabilities disclosed relates to web application. However, this year the number has seen a steep decrease of 37%, especially in the volume of SQL injection vulnerabilities.
IBM also admitted that augmented efforts towards tracking down the botnets and destroying them can also be a significant reason towards reduction of spam and phishing scams.
However, while commenting on this matter, Tom Cross, IBM X-Force Threat Intelligence and Strategy Manager said that of recent, significant improvements have been noticed in providing security successful and controlling spam and phishing activity, in a statement published by v3.co.uk on September 28, 2011. He also added by saying that the department is quite used to bad news and the significant decrease of statistics is progressive of the change in security.
The report also administered of the intention of the X-Force's team of announcing 2011 as the "Year of the Security Breach" because of a large number of high-profile attacks and network compromises. Notingly, the report also highlights that significant threats might be substantial of the year's breaches.
With the intention of collecting strategic intelligence, teams of professional attackers have been able to gain and maintain access to critical computer networks through a unique blend of stealth, sophisticated technical abilities, and cautious planning. According to the report, these kinds of attackers are often referred to as Advanced Persistent Threats (APTs).
However, the success of APTs is indicative of raising the profile of "whaling", which is a type of phishing the high profile targets and accessing all intricate data. According to the revelation of the report, such events often follow once the attacker carefully study the online personal profile of the victimized and drafts a phishing e-mail tactfully to entice the victimized into opening it.
Apart from all these, the rise of renowned Hacktivist groups like Lulzec and Anonymous using the off-the-shelf techniques for committing such targeted attacks are unanimously aiding the increase of spam circulation.
Related article: Significant Rise in Cyber Threats are Expected in 2008
» SPAMfighter News - 11-10-2011
We are happy to see you are reading our IT Security News.
To reward your interest, we would like to offer you any of our award-winning products
at the price $19.95. Pick your own favorites.