Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • IT Management
    • Mobile

    The Good: Less Spam

    By
    Jeff Burt
    -
    March 26, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1The Good: Less Spam

      1

      The amount of spam email in 2011 was about half of what was found the year before, according to IBM. Some of that is attributable to the takedown by law enforcement of several spam botnets, such as the Rustock botnet.

      2The Good: Decline in Exploit Code

      2

      When security vulnerabilities are disclosed, exploit code can be released for attackers to download. This allows them to take advantage of the problem and access computers. IBM saw about 30 percent fewer exploits in 2011 than 2010, and gave credit to software developers instituting architectural and procedural changes that made it more difficult for cyber-criminals to exploit vulnerabilities.

      3The Good: Fewer Unpatched Vulnerabilities

      3

      Some security vulnerabilities in software are never patched. However, the percentage of unpatched vulnerabilities in 2011 was 36 percent. In 2010, it was 43 percent.

      4The Good: Fewer XSS Vulnerabilities

      4

      The quality of software is improving, thanks in part to developers using tools and services to analyze, find and fix vulnerabilities. IBM found that cross-site scripting (XSS) vulnerabilities are 50 percent less likely than four years ago to exist in customers’ software. However, these vulnerabilities still appear in 40 percent of the applications IBM scans with its AppScan OnDemand service. That’s too much.

      5The Bad: Rise in Mobile Exploits

      5

      Attackers are adjusting what they do, and the ripe field of mobile computing is one place they’re focusing on. IBM found a 19 percent jump from 2010 to 2011 in the number of publically released exploits that target mobile devices. That is dicey for IT departments as they deal with the growing bring-your-own-device (BYOD) trend in the enterprise.

      6The Bad: Targeting Social Media

      6

      As social media adoption grows, so has cyber-criminal activity in the space, including a surge of phishing emails posing as social media sites. The issue is made even more dire by the amount of personal and professional information that people are willing to put on these social media sites, according to IBM.

      7The Bad: Targeting Social Media

      7

      As social media adoption grows, so has cyber-criminal activity in the space, including a surge of phishing emails posing as social media sites. The issue is made even more dire by the amount of personal and professional information that people are willing to put on these social media sites, according to IBM.

      8The Bad: Shell Command Injection

      8

      Progress has been made in closing SQL injection vulnerabilities: The number in publically maintained Web applications dropped 46 percent in 2011. Now, some attackers are targeting shell command injection vulnerabilities, which allow them to execute commands directly on a Web server. Shell command injection attacks rose almost three times over the course of 2011, IBM found.

      9The Bad: More Automated Password Guessing

      9

      Poor passwords and password policies continue to play a role in security breaches. Cyber-criminals are continuing to eye this area with automated attacks that scan the Internet for systems with weak log-in passwords. There was a big jump in the second half of 2011 in password-guessing activity aimed at secure shell servers.

      10The Bad: More Phishing

      10

      The volume of email attributed to phishing was relatively low in 2010 and the first half of 2011. That changed in the second half of last year, when researchers saw a surge in activity that reached volumes not seen since 2008. Many of the phishing emails impersonate social media sites or mail parcel services. They try to entice users to click on links to Web pages that could infect their PCs with malware. There also is the problem of click fraud, where misleading emails are used to drive traffic to retail Websites, according to IBM.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×