• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Outlook Poor as 2008 Winds to Close

    December 16, 2008 Alex Woodie

    The state of IT security appears to be on the decline as 2008 comes to a merciful close. Microsoft just issued a massive number of patches one week ago, but it’s the one patch that wasn’t issued–for a zero-day flaw discovered in IE 7 just days before–that ruins the batch. Meanwhile, the global economic crises plods on as cyber pirates continue to ramp up their online schemes–events which have combined to form what IBM labeled a “perfect storm” of security threats. Happy holidays!

    Microsoft released eight security patches to resolve a total of 28 vulnerabilities last week, the final monthly “Patch Tuesday” event of the year. The fixes addressed many flaws across Microsoft products, including IE and Office, and will help to protect customers from a flood of new phishing and data mining attempts. But the fixes did nothing to stop a potentially disastrous new zero-day flaw discovered in Internet Explorer 7.

    Details of the new flaw, which involve IE’s handling of XML, were released just a few days before the December Patch Tuesday event, and appeared to be timed to coincide with the release of the patches. The first active exploits of the IE7 flaw were reported last Monday, according to ScanSafe, a company that delivers security protection via software as a service (SaaS).

    IT organizations should brace for the worst as a result of the flaw, says Mary Landesman, senior security researcher at ScanSafe. “Zero-day exploits involving any widely used software are particularly concerning. [But] when it impacts a browser as widely used as Internet Explorer, it can have serious implications,” she says. “Predictably, attackers were very quick to add the IE7 exploit to their tool kit and we anticipate these attacks will escalate over the coming weeks.”

    Whereas much malware was distributed via e-mail previously, 2008 saw an unprecedented increase in attacks on Web sites, particularly new social networking “Web 2.0” Web sites, according to an end-of-year security report issued by Symantec‘s MessageLabs subsidiary.

    According to MessageLabs, the daily number of new Web sites containing malware rose from 1,068 in January to its peak at 5,424 in November. Many of these sites were compromised through SQL injection techniques, and many of the attacks targeted the new wave of popular social networking sites, says Mark Sunner, chief security analyst for MessageLabs.

    “Web 2.0 offers endless opportunities to scammers for distributing their malware,” Sunner said. “Web 2.0 thrives on user-generated content, as do the spammers. The ability to adapt to new mediums and upload enticing content as ‘snake oil’ to persuade an information-hungry user to activate it, is one of the cybercriminals’ strongest talents, and has made them successful in transforming deception into a fully scalable business model within the underground shadow economy.”

    Meanwhile, IBM announced that it would bolster the security services it offers through its Internet Security Systems subsidiary to thwart what it views as a perfect storm of security threats.

    Statistics from the X-Force research arm of ISS points to a worsening of the IT security across the globe since August. Network and Web-based security events over the last 120 days have increased 30 percent at organizations that utilize ISS services. In response, ISS has seen a 40 percent increase in use of ISS’ virtual operations centers among its clients, which shows that ISS customers are worried.

    “We are currently in a perfect storm of security threats as businesses are cutting costs, insider threats are rising, and cybercriminals are using the ensuing confusion to create opportunities for themselves,” says Val Rahmani, ISS general manager.

    IBM says it will take several steps to respond to these threats. These include a new identity and access management service to be launched next year (weakness in identity management and access is responsible to 42 percent of vulnerabilities, IBM says); a new reseller program that allows partners to resell ISS security services; and free security infrastructure assessments.

    RELATED STORIES

    Patches? We Don’t Need No Stinkin’ Patches: Survey

    Symantec Combats Phishing with New Services Offering

    Decline In Vulnerabilities Belies Threat Increase, Microsoft Says in New Security Report

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    Bleak Outlook for Information Security, According to Researchers

    In Search Of a More Secure Internet

    Security Attacks and Breaches on the Rise

    MPack Hacker Tool Claims 10,000 Compromised Web Sites



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    PowerTech:  Incorporating real-time security events from the System i into a security program
    Safedata:  FREE White Paper - IBM iSeries Recovery Options: An Executive Guide
    COMMON:  Join us at the 2009 annual meeting and expo, April 26-30, Reno, Nevada

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Admin Alert: The Dangers of User Profiles with Privileges Two A-maze-ing Programs

    Leave a Reply Cancel reply

Volume 8, Number 45 -- December 16, 2008
THIS ISSUE SPONSORED BY:

Bytware
Maximum Availability
Seagull Software
ARCAD Software
Twin Data

Table of Contents

  • IBM Adds ‘Rich UI’ Design Tool to Rational Business Developer
  • Original Bolsters Support for Java, Mainframe in Testing Tool
  • Development Horror Stories Surface as Aldon Unveils Turkey Award Winners
  • Tick, Tock: mrc Unveils ’24-Hour Challenge’
  • IBM Gives RPG Devotees Their Own Café
  • CA Enhances Web Services Interoperability in Plex 6.1
  • Security Outlook Poor as 2008 Winds to Close
  • Video Rental Chain Taps Inovis for VAN
  • ACOM Unveils Secure Laser Check Printer
  • IBM Seeks Organic Solution to Power Systems Challenge, Global Warming

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle