• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Outlook Poor as 2008 Winds to Close

    December 16, 2008 Alex Woodie

    The state of IT security appears to be on the decline as 2008 comes to a merciful close. Microsoft just issued a massive number of patches one week ago, but it’s the one patch that wasn’t issued–for a zero-day flaw discovered in IE 7 just days before–that ruins the batch. Meanwhile, the global economic crises plods on as cyber pirates continue to ramp up their online schemes–events which have combined to form what IBM labeled a “perfect storm” of security threats. Happy holidays!

    Microsoft released eight security patches to resolve a total of 28 vulnerabilities last week, the final monthly “Patch Tuesday” event of the year. The fixes addressed many flaws across Microsoft products, including IE and Office, and will help to protect customers from a flood of new phishing and data mining attempts. But the fixes did nothing to stop a potentially disastrous new zero-day flaw discovered in Internet Explorer 7.

    Details of the new flaw, which involve IE’s handling of XML, were released just a few days before the December Patch Tuesday event, and appeared to be timed to coincide with the release of the patches. The first active exploits of the IE7 flaw were reported last Monday, according to ScanSafe, a company that delivers security protection via software as a service (SaaS).

    IT organizations should brace for the worst as a result of the flaw, says Mary Landesman, senior security researcher at ScanSafe. “Zero-day exploits involving any widely used software are particularly concerning. [But] when it impacts a browser as widely used as Internet Explorer, it can have serious implications,” she says. “Predictably, attackers were very quick to add the IE7 exploit to their tool kit and we anticipate these attacks will escalate over the coming weeks.”

    Whereas much malware was distributed via e-mail previously, 2008 saw an unprecedented increase in attacks on Web sites, particularly new social networking “Web 2.0” Web sites, according to an end-of-year security report issued by Symantec‘s MessageLabs subsidiary.

    According to MessageLabs, the daily number of new Web sites containing malware rose from 1,068 in January to its peak at 5,424 in November. Many of these sites were compromised through SQL injection techniques, and many of the attacks targeted the new wave of popular social networking sites, says Mark Sunner, chief security analyst for MessageLabs.

    “Web 2.0 offers endless opportunities to scammers for distributing their malware,” Sunner said. “Web 2.0 thrives on user-generated content, as do the spammers. The ability to adapt to new mediums and upload enticing content as ‘snake oil’ to persuade an information-hungry user to activate it, is one of the cybercriminals’ strongest talents, and has made them successful in transforming deception into a fully scalable business model within the underground shadow economy.”

    Meanwhile, IBM announced that it would bolster the security services it offers through its Internet Security Systems subsidiary to thwart what it views as a perfect storm of security threats.

    Statistics from the X-Force research arm of ISS points to a worsening of the IT security across the globe since August. Network and Web-based security events over the last 120 days have increased 30 percent at organizations that utilize ISS services. In response, ISS has seen a 40 percent increase in use of ISS’ virtual operations centers among its clients, which shows that ISS customers are worried.

    “We are currently in a perfect storm of security threats as businesses are cutting costs, insider threats are rising, and cybercriminals are using the ensuing confusion to create opportunities for themselves,” says Val Rahmani, ISS general manager.

    IBM says it will take several steps to respond to these threats. These include a new identity and access management service to be launched next year (weakness in identity management and access is responsible to 42 percent of vulnerabilities, IBM says); a new reseller program that allows partners to resell ISS security services; and free security infrastructure assessments.

    RELATED STORIES

    Patches? We Don’t Need No Stinkin’ Patches: Survey

    Symantec Combats Phishing with New Services Offering

    Decline In Vulnerabilities Belies Threat Increase, Microsoft Says in New Security Report

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    Bleak Outlook for Information Security, According to Researchers

    In Search Of a More Secure Internet

    Security Attacks and Breaches on the Rise

    MPack Hacker Tool Claims 10,000 Compromised Web Sites



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    Git up to speed with MDChange!

    Git can be lightning-fast when dealing with just a few hundred items in a repository. But when dealing with tens of thousands of items, transaction wait times can take minutes.

    MDChange offers an elegant solution that enables you to work efficiently any size Git repository while making your Git experience seamless and highly responsive.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    PowerTech:  Incorporating real-time security events from the System i into a security program
    Safedata:  FREE White Paper - IBM iSeries Recovery Options: An Executive Guide
    COMMON:  Join us at the 2009 annual meeting and expo, April 26-30, Reno, Nevada

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Admin Alert: The Dangers of User Profiles with Privileges Two A-maze-ing Programs

    Leave a Reply Cancel reply

Volume 8, Number 45 -- December 16, 2008
THIS ISSUE SPONSORED BY:

Bytware
Maximum Availability
Seagull Software
ARCAD Software
Twin Data

Table of Contents

  • IBM Adds ‘Rich UI’ Design Tool to Rational Business Developer
  • Original Bolsters Support for Java, Mainframe in Testing Tool
  • Development Horror Stories Surface as Aldon Unveils Turkey Award Winners
  • Tick, Tock: mrc Unveils ’24-Hour Challenge’
  • IBM Gives RPG Devotees Their Own Café
  • CA Enhances Web Services Interoperability in Plex 6.1
  • Security Outlook Poor as 2008 Winds to Close
  • Video Rental Chain Taps Inovis for VAN
  • ACOM Unveils Secure Laser Check Printer
  • IBM Seeks Organic Solution to Power Systems Challenge, Global Warming

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle