IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits

September 20, 2012 By The Vigilant Application Owner

Infosecurity – (International) IBM: Top threats include data breaches, BYOD, browser exploits. When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for – 15 – Internet Explorer and Java, along with renewed concerns around social media password security and continued disparity in mobile devices and corporate bring-your-owndevice (BYOD) programs. That information comes from the IBM X-Force 2012 MidYear Trend and Risk Report, which shows that a continuing trend for attackers is to target individuals by directing them to a trusted URL or site injected with malicious code. Through browser vulnerabilities, the attackers are able to install malware on the target system. Further, the growth of SQL injection, a technique used by attackers to access a database through a Web site, is keeping pace with the increased usage of cross-site scripting and directory traversal commands.


  • Enterprise Mobile Hub

    Excellent post! I think BYOD is good, bad and ugly and it has merits and demerits both. What do you think?