News and Notes from the Makers of Nexus | Sonatype Blog

IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits

Written by Ali Loney | September 20, 2012

Infosecurity – (International) IBM: Top threats include data breaches, BYOD, browser exploits. When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for - 15 - Internet Explorer and Java, along with renewed concerns around social media password security and continued disparity in mobile devices and corporate bring-your-owndevice (BYOD) programs. That information comes from the IBM X-Force 2012 MidYear Trend and Risk Report, which shows that a continuing trend for attackers is to target individuals by directing them to a trusted URL or site injected with malicious code. Through browser vulnerabilities, the attackers are able to install malware on the target system. Further, the growth of SQL injection, a technique used by attackers to access a database through a Web site, is keeping pace with the increased usage of cross-site scripting and directory traversal commands.

Source: http://www.infosecurity-magazine.com/view/28370/ibm-top-threats-includedata-breaches-byod-browser-exploits