News

Security Woes Up, as PHP and OSS Make the List

Software vulnerabilities are up this year, especially Web browser-based ones, according to a new report from IBM Internet Security Systems. The X-Force 2008 Mid-Year Trend Statistics Report, released in late July, defined the problem broadly. A vulnerability is anything that results "in a weakening or breakdown of the confidentiality, integrity, or accessibility of the computing system."

Topping the list of companies reporting the most vulnerabilities were such tech mainstays as IBM, Microsoft, Apple and Cisco Systems. Microsoft had the third most reported vulnerabilities. However, an interesting dimension to this year's report is that open source software (OSS) or free software groups, such as Mozilla's Firefox, WordPress and Joomla, also made the list of programs with security holes in them.

Larger entities such as Microsoft or IBM make the list because of the volume of software they produce, explained Tom Cross, an X-Force researcher at IBM Internet Security Systems.

"Companies that make a lot of software are subject to more disclosures," Cross added. "But we're seeing for the first time that community-developed open source such as the Drupal and Joomla content management software packages for the Web also showed up on the list."

Drupal and Joomla are both OSS packages that have both been vulnerable to recent SQL injection attacks.

Overall, the study tracked more than 3,534 disclosed vulnerabilities in software for the first half of the year, finding a five percent increase compared with the first half of 2007. Leading the list of vulnerabilities were malicious spam, phishing and different strains of malware. The nearly 80-page report found that so-called "high risk" vulnerabilities were on the rise.

A big concern of the report was the use of the PHP scripting language, which was associated with many vendor-identified vulnerabilities.

PHP is mainly used by Web developers to help create dynamic Web pages. According to the PHP Group, a research organization, PHP was installed on more than 20 million Web sites and one million Web servers as of April 2007. It is doubtless double that amount now.

The Web is emerging as the most common vector hackers are using these days for entry into networks, as well as to deliver malicious software. The report's findings confirm other research saying that attacks against trusted Web sites are up.

Moreover, hackers seem to be keeping up with security bulletins. The report concludes that 94 percent of public exploits affecting Web browser bugs were released on the same day as the public security notice.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

comments powered by Disqus

Featured

  • Windows Community Toolkit v8.2 Adds Native AOT Support

    Microsoft shipped Windows Community Toolkit v8.2, an incremental update to the open-source collection of helper functions and other resources designed to simplify the development of Windows applications. The main new feature is support for native ahead-of-time (AOT) compilation.

  • New 'Visual Studio Hub' 1-Stop-Shop for GitHub Copilot Resources, More

    Unsurprisingly, GitHub Copilot resources are front-and-center in Microsoft's new Visual Studio Hub, a one-stop-shop for all things concerning your favorite IDE.

  • Mastering Blazor Authentication and Authorization

    At the Visual Studio Live! @ Microsoft HQ developer conference set for August, Rockford Lhotka will explain the ins and outs of authentication across Blazor Server, WebAssembly, and .NET MAUI Hybrid apps, and show how to use identity and claims to customize application behavior through fine-grained authorization.

  • Linear Support Vector Regression from Scratch Using C# with Evolutionary Training

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the linear support vector regression (linear SVR) technique, where the goal is to predict a single numeric value. A linear SVR model uses an unusual error/loss function and cannot be trained using standard simple techniques, and so evolutionary optimization training is used.

  • Low-Code Report Says AI Will Enhance, Not Replace DIY Dev Tools

    Along with replacing software developers and possibly killing humanity, advanced AI is seen by many as a death knell for the do-it-yourself, low-code/no-code tooling industry, but a new report belies that notion.

Subscribe on YouTube