Resources Blog IBM: Top Threats Include Data Breaches, BYOD, Browser ...

IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits

Infosecurity – (International) IBM: Top threats include data breaches, BYOD, browser exploits. When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for - 15 - Internet Explorer and Java, along with renewed concerns around social media password security and continued disparity in mobile devices and corporate bring-your-owndevice (BYOD) programs. That information comes from the IBM X-Force 2012 MidYear Trend and Risk Report, which shows that a continuing trend for attackers is to target individuals by directing them to a trusted URL or site injected with malicious code. Through browser vulnerabilities, the attackers are able to install malware on the target system. Further, the growth of SQL injection, a technique used by attackers to access a database through a Web site, is keeping pace with the increased usage of cross-site scripting and directory traversal commands.


Picture of Ali Loney

Written by Ali Loney

Ali Loney is a Senior UX Designer at Walmart Labs. She is based in Canada and was the former Graphic Designer at Sonatype.