<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TT8R4P" height="0" width="0" style="display:none;visibility:hidden">

Sonatype Blog

Stay updated on the latest news from the makers of Nexus

IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits

Infosecurity – (International) IBM: Top threats include data breaches, BYOD, browser exploits. When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for - 15 - Internet Explorer and Java, along with renewed concerns around social media password security and continued disparity in mobile devices and corporate bring-your-owndevice (BYOD) programs. That information comes from the IBM X-Force 2012 MidYear Trend and Risk Report, which shows that a continuing trend for attackers is to target individuals by directing them to a trusted URL or site injected with malicious code. Through browser vulnerabilities, the attackers are able to install malware on the target system. Further, the growth of SQL injection, a technique used by attackers to access a database through a Web site, is keeping pace with the increased usage of cross-site scripting and directory traversal commands.

Source: http://www.infosecurity-magazine.com/view/28370/ibm-top-threats-includedata-breaches-byod-browser-exploits

Topics: News security AppSec Spotlight