Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

News

August 26, 2009 |

19 Percent of Online Attacks Target Social Networks

New report says hackers are exploiting sites like Twitter in increasing numbers, displacing government/law enforcement sites as the attack sites of choice.

19 Percent of Online Attacks Target Social Networks

New report says hackers are exploiting sites like Twitter in increasing numbers, displacing government/law enforcement sites as the attack sites of choice.

Social networking sites have seen a steep rise in attacks, according to the Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report from Breach Security Labs, the research arm of Breach Security Inc., based in Carlsbad, Calif. Accounting for 19 percent of hacking incidents, social networking sites were the most targeted vertical market in the first half of 2009, says the report, with hackers exploiting Web 2.0 features such as user-generated content-including Twitter posts-to launch their attacks.

The WHID project compiles and analyzes application-related security incidents, focusing on publicly reported Web application security attacks that have an identified outcome. The biannual report analyzed global security incidents that occurred from January 1 through July 31, 2009, a 30 percent increase in overall Web attacks compared with the first half of 2008.†

Key findings from the report include:

Drivers for Web Hacking-Defacement, which combines both planting of malware and standard overt changes, remains the most common outcome of Web attacks (28 percent), while leakage of sensitive information is a close second (26 percent, up from 19 percent in 2008). Disinformation is a distant third (19 percent), mostly due to the hacking of celebrity online identities.

Most Prevalent Attack Vectors-SQL injection remains the number one attack vector, accounting for nearly one-fifth of all security breaches (19 percent). Attack vectors exploiting Web 2.0 features such as user-contributed content were also commonly employed: Authentication abuse was the second most active attack vector (11 percent), and cross-site request forgery (CSRF) rose to number five with 5 percent of the reported attacks.

Vertical Markets under Attack-Social networking sites emerged as the most targeted vertical market with 19 percent of the incidents, a dramatic increase from prior years when this sector was not represented, and displacing government/law enforcement from the number one spot in 2008.

“The dramatic rise in attacks against social networking sites this year can primarily be attributed to attacks on popular new technologies like Twitter, where cross-site scripting and CSRF worms were unleashed,” says Ryan Barnett, director of application security research for Breach Security. “Looking back at 2008, a notable election year, government-related organizations were the top-ranked attack victims and have now dropped to number three. The WHID report demonstrates that hackers can be fickle, following popular culture and trends to achieve the most visible effect for their efforts, which means that companies must be vigilant in implementing Web application systems and monitoring application activity.”

The Web Hacking Incidents Database is a project dedicated to maintaining a record of Web application-related security incidents. The WHID’s purpose is to serve as a tool for raising awareness of Web application security problems and to provide information for statistical analysis of Web application security incidents. Rather than focusing on the technical aspect of the incident, the WHID focuses on the impact of the attack.†Breach Security Labs is a WHID project contributor.

To learn more, click here to download a complete copy of Breach’s 2009 WHID biannual report.†


Editor’s Choice

Broadcom-VMware Shakeout: How the Channel Has Been Affected By the Big Industry Acquisition

April 11, 2024 |

Industry experts weigh in on the “messy breakup” that MSPs were left with after Broadcom’s acquisition of VMWare.

Selling Cybersecurity: How MSPs Can Become Crucial Partners in Managing Risk

March 27, 2024 | David Powell

MSPs should try to bring an end customer into the cybersecurity fold. Here are some ways to help drive that.

3 Questions with Ingram Micro’s Sanjib Sahoo on Integrating AI into Managed Services

March 25, 2024 |

Ingram Micro’s EVP and chief digital officer shares some insights on how MSPs can effectively integrate artificial intelligence into their business operations.


Related News

Growing the MSP

Explore ChannelPro

Events

Reach Our Audience