Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    SANS Top Internet Security Risks of 2007

    By
    eWEEK EDITORS
    -
    November 27, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1SANS Top Internet Security Risks of 2007

      1

      Attackers in 2007 turned their attention from technical issues and problems to far easier prey: human beings. Spear-phishing exploits have targeted rich victims and military and government targets in nation-state espionage, as well as C-level executives f

      2SANS Top Internet Security Risks of 2007 – Client-side Vulnerabilities in Web Browsers

      2

      Browsers and plug-ins have become a malware playground, with exploit code out for Microsoft Internet Explorer flaws, malware sites that can launch exploits based on a given browser and the use of IE to exploit vulnerabilities in other core Windows com

      3SANS Top Internet Security Risks of 2007 – Client-side Vulnerabilities in Microsoft Office

      3

      Qualys has tracked a 300 percent increase in Office application vulnerabilities during the past year—primarily, new Excel vulnerabilities that can easily be exploited by getting unsuspecting users to open Excel files sent via e-mail and instant m

      4SANS Top Internet Security Risks of 2007 – Client-side Vulnerabilities in E-mail Clients

      4

      E-mail has become a common vector for multiple vulnerabilities and has been used to distribute malware, including viruses, Trojans, keyloggers, spyware, adware and rootkits; to perpetrate phishing attacks, and for stealing passwords or other confidenti

      5SANS Top Internet Security Risks of 2007 – Client-side Vulnerabilities in Media Players

      5

      Vulnerabilities were released for most popular media players in 2007. No operating system was spared, as the following media players for Windows, Mac OS and Linux/Unix were hit: Windows Media Player, RealPlayer, QuickTime, Adobe Flash Player and iTunes

      6SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Web Applications

      6

      Web-based applications such as content management systems, wikis, portals, bulletin boards and discussion forums, as well as custom-built Web applications, are hit by hundreds of vulnerabilities every week. SANS says the number of attempted attacks for

      7SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Windows Services

      7

      Vulnerabilities in Windows operating system services are some of the most common avenues for exploitation, yet some are configured to run by default whenever the computer is restarted. SANS advises that users disable any unneeded services to enhance se

      8SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Unix and Mac OS Services

      8

      Even fully patched services can be problematic, with brute-force attacks against remote services such as SSH (Secure Shell), FTP and Telnet still being the most common danger for servers facing the Internet. During the last couple of years, a concerte

      9SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Backup Software

      9

      Since backup software generally runs with high privileges to read all files on a system, vulnerabilities have led to severe security repercussions. The affected operating systems tend to be Windows and Unix, as the preponderance of enterprise clients a

      10SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Anti-Virus Software

      10

      Attackers are exploiting security products, including anti-virus and personal firewall software. Vulnerabilities arent limited to desktop and server platforms: Gateway solutions are also affected, which is particularly serious, given that the gateway

      11SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Management Servers

      11

      Applications such as on-server virus and spam filters, directory servers, and management and monitoring systems pose a unique security challenge. In addition to providing opportunities for compromising the system hosting them, these apps provide opport

      12SANS Top Internet Security Risks of 2007 – Server-side Vulnerabilities in Database Software

      12

      The most common vulnerabilities in database systems are use of default configurations with default user names and passwords; SQL injection via the databases own tools, third-party applications or Web front ends added by users; use of weak passwords fo

      13SANS Top Internet Security Risks of 2007 – Excessive User Rights and Unauthorized Devices

      13

      The best efforts to secure an information system are futile if users connect unauthorized devices to the network or install unauthorized, potentially dangerous software. A rogue wireless access point can be an open door to any malicious individual want

      14SANS Top Internet Security Risks of 2007 – Phishing/Spear Phishing

      14

      Spear phishing has become one of the most damaging forms of attacks on military organizations in the United States and other developed countries. Attackers gain user name and password information and then break in to gain sensitive military information

      15SANS Top Internet Security Risks of 2007 – Unencrypted Laptops and Removable Media

      15

      Loss of laptops and removable media has become a major liability for corporations and government agencies, as well as for general consumers. All too frequently, a major loss of personal or identifying information is traced back to the loss of a single

      16SANS Top Internet Security Risks of 2007 – Application Abuse of IM

      16

      The widespread use of instant messaging can significantly increase security risks. Attacks include variants of e-mail worms spread via IM, new variations in the establishment and spread of botnets, and the use of compromised IM accounts to lure users i

      17SANS Top Internet Security Risks of 2007 – Application Abuse of P2P

      17

      Peer-to-peer networks can be attacked by modifying legitimate files with malware; seeding malware files into shared directories; exploiting vulnerabilities in the protocol or errors in coding; blocking (filtering) the protocol; denial of service by mak

      18SANS Top Internet Security Risks of 2007 – VOIP Servers and Phones

      18

      Vulnerabilities have been found in VOIP (voice over IP) products such as Cisco Unified Call Manager and Asterisk, along with VOIP phones from multiple vendors. Attackers are carrying out VOIP phishing scams, eavesdropping, or leveraging toll fraud or d

      19SANS Top Internet Security Risks of 2007 – Zero Day Attacks

      19

      Once a working exploit of a new, unpatched vulnerability is released into the wild, users of the affected software will be compromised until a software patch is available or some form of mitigation is taken. Several zero-day attacks were recorded in 20

      20SANS Top Internet Security Risks of 2007 – See More Slide Shows Like This One!

      20

      • Worst Data Breaches Ever
      • The Most Poisonous Bugs
      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×