Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Mobile

    Android Apps, Internet Explorer, Java Among the Most Vulnerable: HP

    By
    Nathan Eddy
    -
    February 5, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Android Apps, Internet Explorer, Java Among the Most Vulnerable: HP

      1 - Android Apps, Internet Explorer, Java Among the Most Vulnerable: HP

      by Nathan Eddy

      2Android Applications Use Encryption Improperly

      2 - Android Applications Use Encryption Improperly

      As the lines are blurred between mobile technology and traditional form factors, and mobile devices are often used to manipulate confidential data for both personal and business use, encryption of targeted data is increasingly important. The report found that 46 percent of Android apps improperly use encryption.

      3Internet Explorer the Most Targeted Software

      3 - Internet Explorer the Most Targeted Software

      Many more vulnerabilities were discovered for Internet Explorer in 2013, and HP’s Zero Day Initiative (ZDI) recorded more than a 100 percent increase, compared with 2012 numbers. The report said this is not a gauge of the security of Internet Explorer, but rather, results from the market forces (both legitimate and illegitimate) that govern the price of vulnerabilities in software with massive market penetration.

      4Clients, Servers Both Susceptible to Attack

      4 - Clients, Servers Both Susceptible to Attack

      The 216 unique vulnerability categories detected during the audits were distributed almost evenly between two major buckets. Nearly 52 percent of the issues were a result of insecure client-side operation while about 48 percent were related to either insecure server-side application code or code quality issues that could result in unstable application behavior.

      5SCADA Systems Are Increasingly Targeted

      5 - SCADA Systems Are Increasingly Targeted

      Another extremely tempting target—supervisory control and data acquisition (SCADA) systems—first gained attention after the Stuxnet worm was discovered to have infiltrated an Iranian uranium enrichment plant in 2010 and specifically targeted equipment manufactured by one company. ZDI’s external researchers are actively interested in finding, and disclosing these vulnerabilities.

      6Cross-Site Scripting a Top Vulnerability

      6 - Cross-Site Scripting a Top Vulnerability

      One of the most prolific vulnerabilities over the past decade, cross-site scripting stands at the top regarding the frequency in which it appears in the affected applications. Although 82 percent of the affected applications demonstrated weaknesses to type one , or “reflected,” cross-site scripting, the category with the highest impact comprises a mere 5 percent of the applications—type two, or “persistent,” cross-site scripting.

      7Java Remains a Target for Exploitation

      7 - Java Remains a Target for Exploitation

      Since early 2011, Oracle has patched almost 300 remotely exploitable vulnerabilities in Java. These issues range from the classic stack-based buffer overflow to the more complicated sandbox bypass vulnerabilities that require the attacker to chain a series of weaknesses to disable the security manager. Every year, the number of vulnerabilities being fixed has increased, with just over 50 issues patched in all of 2011 to more than 180 in 2013, and researchers continue to discover new ways to find holes in the various subcomponents of Java and bypass the security architecture.

      8Differing Definitions of Malware Make Measuring Difficult

      8 - Differing Definitions of Malware Make Measuring Difficult

      The company’s examination of more than 500,000 apps for the Android platform turned up some surprising results, including major discrepancies between how Google and different antivirus companies judge the behavior and intent of mobile apps. Limiting the number of apps available within an organization, monitoring approved apps and thoroughly vetting end-user licensing agreements are the absolute baseline for responsible defense, the report said.

      9South Korea: A Case Study in Vulnerability

      9 - South Korea: A Case Study in Vulnerability

      As discovered in analyzing targeted attacks in the South Korea—in which a malware payload was executed last March on computers belonging to targeted businesses and organizations in the country—even though the malware involved was not that sophisticated, it was good enough to compromise the networks of several organizations and cause malicious damage and significant interruptions to normal function. The report warned that organizations must understand that there isn’t a single path to take to protect vital business assets from threats.

      10Apple’s Screening Process Makes iOS Safer

      10 - Apple's Screening Process Makes iOS Safer

      Compared with the high detection numbers for Android apps reported by particular companies, things look different for iOS, with few reports of malware for this platform. A major difference between the Android and iOS app platforms is the screening process of the app store. The Apple iOS store performs a detailed screening process that can take weeks and will reject apps for a number of nontechnical reasons, including test or demo versions and apps that are primarily marketing materials or advertisements.

      11Vulnerability Disclosures Decrease in Severity

      11 - Vulnerability Disclosures Decrease in Severity

      While vulnerability research continued to gain attention, the total number of publicly disclosed vulnerabilities in 2013 was stable, and the number of high-severity vulnerabilities decreased for the fourth consecutive year. The number classified as “high severity” as reported by the company has declined since 2010.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×