HP today published its 2010 Top Cyber Security Risks Report, identifying a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss.

While there were more attacks recorded in 2010, the number of discovered vulnerabilities remained relatively stable, but high. The new report indicates that while the majority of attacks are against known and patched security vulnerabilities, many high-profile attacks use new vulnerabilities before vendors issue fixes.

To combat both types of attacks, businesses and governments can reduce risk with improved security practices, such as keeping their security systems up to date and leveraging the research of the HP Digital Vaccine Labs’ (DVLabs) Zero Day Initiative.

The new report by HP DVLabs builds on the midyear report published by HP in 2010. The purpose of the reports is to provide vital information to organizations that will enable them to implement security policies that protect their IT assets. The new report helps advance the security of the HP Converged Infrastructure portfolio, which integrates data center technologies to simplify IT environments, resulting in improved flexibility, scalability and total cost of ownership.

A key finding in the new report is the dramatic increase of web exploit toolkits. These “packaged” attack frameworks are traded online, enabling attackers to access enterprise IT systems and steal sensitive data. According to the report, web exploit toolkits are rapidly growing as the weapon of choice by attackers due to ease of use and high success rate.

Web application vulnerabilities represent half of all security vulnerabilities and continue to plague enterprises, according to the data generated by HP WebInspect, an HP Fortify product. The report identifies third-party plug-ins to content management systems as a leading cause of web application vulnerabilities. Blog-hosting and online discussion forum applications, such as WordPress, Joomla and Drupal, are among the most frequently attacked systems.

“We’ve discovered that rather than investing resources to uncover new exploits, attackers are focused on current, unpatched vulnerabilities in web applications, social networking sites and Web 2.0 interfaces,” said Mike Dausin, manager, Advanced Security Intelligence, HP DVLabs. “HP TippingPoint, ArcSight and Fortify security solutions, coupled with HP’s experience in IT management and application life cycle management, offer clients protection from the latest attacks threatening to disrupt business continuity.”

Post By Gishore J Kallarackal (2,121 Posts)

Gishore J Kallarackal is the founder of techgurulive. The purpose of this site is to share information about free resources that techies can use for reference. You can follow me on the social web, subscribe to the RSS Feed or sign up for the email newsletter for your daily dose of tech tips & tutorials. You can content me via @twitter or e-mail.

Website: → Techgurulive