Web Applications Under Siege

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17
Previous Next

Click through for results from a security threat survey conducted by HP.

Topics : Acer, Tablets Netbooks and UMPCs, Product Recall, Mesh Networks, WiMax

While it's no surprise that systems on the Web are the primary targets for malware, it's troubling that attacks aimed at Apple QuickTime and Adobe Flash have tripled in the first six months of this year.


Those are the findings of a recent survey from Hewlett-Packard’s TippingPoint team, which came to HP in the recent acquisition of 3Com.

According to Mike Dausin, manager for advanced security intelligence for HP TippingPoint DVLabs,  attacks not only are becoming more frequent, but more sophisticated as well. While the malware itself in many cases is “beautifully written,” the attacks themselves being aimed at software that is among the least secure on the Web.

This path-of-least-resistance approach is consistent with the history of malware. But now that Windows operating systems and network perimeters are generally more secure, malware distributors are simply moving on to the next easy targets.

Dausin says HP has also documented a sharp rise in JavaScript and PHP File attacks and that older attacks, such as SQL Injections, are making a comeback.

HP highly recommends that IT organizations make sure they are running the latest version of common Web applications, such as version 9 of Adobe Reader, that are inherently more secure.

But dealing with these attacks effectively will require more resources to be allocated to application security. In many cases, that may mean consolidating network perimeter security appliances to save money that can be reallocated to application security. In other cases, it might mean allocating more of the applications budget to deal with security issues.

There may never be the perfectly secure Web application. But one thing that is for certain, if an IT organization makes it easy to compromise a Web application,  in all probability it has already happened.

 

More Slideshows

Top 10 Data Disasters of 2012

This year’s list represents that the increasing reliance on electronic data and reliability of technology is often met by human error. ...  More >>

2012's Hottest New Tablets

A line up of the newest tablets to hit the market. ...  More >>

Notebooks Remain Best Business Productivity Choice, for Now Notebooks Remain Best Business Productivity Choice, for Now

Five reasons why notebooks are simply a better productivity choice for business....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.