Security outfits helping hackers

By
Follow google news

Hackers are getting quicker at taking advantage of publicly-disclosed security holes, new research shows.


IBM's latest Internet Security Systems X-Force shows that more attacks are coming within 24 hours after a vulnerability is disclosed.

It means that security flaws are being exploited in Web browsers, computer operating systems and other programs before many people even have had time to learn about them.

Biggish Blue said that web crims are using tools to help them automatically generate attacks based on publicly-available information about vulnerabilities. It used to take them ages finding holes themselves but now they have the tools to do it.

They also stand on the shoulders of the security research community who provides them with the details.

Part of the problem is that insecurity experts release not only details of the vulnerability but also so-called "proof-of-concept" exploit code to show the flaw is legitimate.

This means that criminals get a framework for building their attacks, and that saves them valuable time in doing so.

Web browsers are an area heavily targeted by hackers. Hacking exploits were available within a day after flaws were discovered 94 percent of the time, up from 79 percent in 2007, IBM's report said.

With PC vulnerabilities, over 80 per cent of the exploit code was released the same day or even before the holes were publicly disclosed. That's up from 70 percent last year, according to the IBM study. ยต

L'Inq AP
Got a news tip for our journalists? Share it with us anonymously here.
theinquirer.net (c) 2010 Incisive Media
Tags:

Most Read Articles

Telstra used ConnectID impermissibly for months

Telstra used ConnectID impermissibly for months

University of Sydney "online IT code library" breached

University of Sydney "online IT code library" breached

US bars approvals of new models of DJI, all other foreign drones

US bars approvals of new models of DJI, all other foreign drones

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Log In

  |  Forgot your password?