Posts Tagged ‘Web-based attacks’

Java DangerAccording to security vendor Websense, most browsers with installed Java-plugin vulnerable for at least one exploit-kit, used for a number of web-based attacks.

In Websense say they used their own analytical network that tracks billions of Web requests from several million end-user computers. Network is able to detect the version of Java, installed on the system, and the browser with which it works.

According to the latest telemetry, only 5.5% of users have the latest version of Java and the latest version of the browser in the system (Java 7 Update 17 or Java 6 Update 41), but even for these versions of Java in the network already sold exploit kits, allowing the use of remains open holes in the software. (more…)

Security AnalysisEvery year the information security threats are becoming more difficult to detect.

2011 for most businesses was a year of awareness of the seriousness of issues related to information security, as many well-known organizations have experienced hacking of information systems and information leakage.

During 2012, we can see that there are new types of malicious software, expands the range of virus and hacker attacks – compared to last year the malicious activity increased by 30%. World Network in the near future, of course, remain the main channel for the dissemination of malware. Attackers will continue to develop methods of social engineering designed to targeted attacks on browsers and related applications (applications that run group).

For most organizations, it becomes a serious threat information increased use of smartphones and tablet PCs. Poor control of mobile devices raises a number of employees of information security problems requiring urgent solutions, and creates a lot of challenges for IT departments.

It can be expected that cybercriminals will continue to actively use cloud technology to spread malicious code. Continue hacktivists attack groups such as LulzSec and Anonymous, leading to a denial of service, leaked documents and inaccessible sites. (more…)