* Symantec documented its highest number of new vulnerabilities since 1998 Are you sleeping OK at night? Are you getting your restful recharge, with no lingering doubts about network security in the back of your head? If so, and you want to keep it that way, don’t read on. No sense in disturbing a perfectly good sleep pattern over what might creep up to bite you at work.But if you’re the kind that doesn’t want to get blindsided, then read not only this article, but the full Symantec Internet Security Threat Report, March 2006 edition.Symantec publishes its Security Threat report every six months. It’s a very detailed analysis of what kinds of threats the company saw in the previous half year. The March 2006 report covers activity that took place from July 1, 2005 to December 31, 2005. Given that this is Symantec’s ninth such report, the company has a good history of the specific threats we’ve seen and a good trend report of how things have changed over the years. The companies offers suggestions (as well as products) for beefing up your network security and reducing your exposure to the various threats.According to the report, Symantec’s data comes from more than 40,000 sensors monitoring network activity in more than 180 countries. Moreover, Symantec gathers malicious code data and spyware and adware reports from over 120 million client, server and gateway systems that have deployed Symantec’s anti-virus products. That’s an awful lot of data, yielding a worldwide picture of threats and vulnerabilities. The trend highlight of the March 2006 report is that cybercrime and criminal attacks are on the increase, now dominating other types of attacks. Manifestations of these attacks include logging keystrokes, stealing cached passwords, and downloading files with confidential information. Not surprisingly, Symantec says that the financial services sector was the most frequently targeted industry.Symantec warns about the increase in Web application vulnerabilities. According to the report, vulnerabilities in Web browser and Web server technologies are particularly threatening because they may be exposed to threats that are more difficult to prevent and detect. 69% of the vulnerabilities detected during the report period were associated with Web applications – up from 49% in the prior six months. Symantec calls Web browsers “one of the easiest ways to attack users.” Contrary to popular belief, Microsoft’s Internet Explorer doesn’t have a lock on vulnerabilities. Although IE had 24 new vendor-confirmed and non-vendor-confirmed vulnerabilities identified in the latter half of 2005, Mozilla’s Firefox browser nearly kept pace with 17 such vulnerabilities. Symantec draws a conclusion on this, however, by stating, “Due to the nature of the open source development process, Firefox developers may be able to acknowledge and address vulnerabilities more quickly than developers of closed source browsers.” (As my catty friends and I would say, “Me-ow!”)Other trend findings of this report:* Symantec documented its highest number of new vulnerabilities (1,896) since 1998. In fact, 2005 was a more active year than 2004 for vulnerabilities, with a 40% increase year over year.* It’s taking slightly longer for hackers to exploit a vulnerability (now 6.8 days vs. 6.0 days before) and less time for vendors to release a patch (an average of 49 days, down from 64 days) once a vulnerability is disclosed.* Phishing attempts are on the increase. Symantec blocked 1.5 billion phishing attempts between July and December 2005, up 44% over the first half of 2005.* The United States was the country of origin of 56% of all spam. (Let’s hear it for capitalism!) Symantec, of course, is just one computer security company with its own view of the Internet. If you want a more vendor-neutral glimpse of security, try SecurityFous, which describes itself as “a site that provides objective, timely and comprehensive security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.” With so many people sharing information about threats, vulnerabilities and protective measures, you’re bound to get the answers you need from one of the online forums. Then you can rest easy at night once again. Related content feature 5 ways to boost server efficiency Right-sizing workloads, upgrading to newer servers, and managing power consumption can help enterprises reach their data center sustainability goals. By Maria Korolov Dec 04, 2023 9 mins Green IT Servers Data Center news Omdia: AI boosts server spending but unit sales still plunge A rush to build AI capacity using expensive coprocessors is jacking up the prices of servers, says research firm Omdia. By Andy Patrizio Dec 04, 2023 4 mins CPUs and Processors Generative AI Data Center feature What is Ethernet? History, evolution and roadmap The Ethernet protocol connects LANs, WANs, Internet, cloud, IoT devices, Wi-Fi systems into one seamless global communications network. By John Breeden Dec 04, 2023 11 mins Networking news IBM unveils Heron quantum processor and new modular quantum computer IBM also shared its 10-year quantum computing roadmap, which prioritizes improvements in gate operations and error-correction capabilities. By Michael Cooney Dec 04, 2023 5 mins CPUs and Processors High-Performance Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe