dcsimg

Web Applications Under Siege




1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Previous Web Applications Under Siege-1 Next

Click through for results from a security threat survey conducted by HP.

While it's no surprise that systems on the Web are the primary targets for malware, it's troubling that attacks aimed at Apple QuickTime and Adobe Flash have tripled in the first six months of this year.

Those are the findings of a recent survey from Hewlett-Packard’s TippingPoint team, which came to HP in the recent acquisition of 3Com.

According to Mike Dausin, manager for advanced security intelligence for HP TippingPoint DVLabs,  attacks not only are becoming more frequent, but more sophisticated as well. While the malware itself in many cases is “beautifully written,” the attacks themselves being aimed at software that is among the least secure on the Web.

This path-of-least-resistance approach is consistent with the history of malware. But now that Windows operating systems and network perimeters are generally more secure, malware distributors are simply moving on to the next easy targets.

Dausin says HP has also documented a sharp rise in JavaScript and PHP File attacks and that older attacks, such as SQL Injections, are making a comeback.

HP highly recommends that IT organizations make sure they are running the latest version of common Web applications, such as version 9 of Adobe Reader, that are inherently more secure.

But dealing with these attacks effectively will require more resources to be allocated to application security. In many cases, that may mean consolidating network perimeter security appliances to save money that can be reallocated to application security. In other cases, it might mean allocating more of the applications budget to deal with security issues.

There may never be the perfectly secure Web application. But one thing that is for certain, if an IT organization makes it easy to compromise a Web application,  in all probability it has already happened.

 

Related Topics : Acer, Tablets Netbooks and UMPCs, Product Recall, Mesh Networks, WiMax

 
More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

HCI 10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations. ...  More >>

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.