Jump to content

Industry voice: The vulnerability conundrum


Recommended Posts

http://cdn.mos.techradar.com//art/other/Generics/hacker-470-75.jpg

Threats such as SQL injection and cross site scripting (XSS) have plagued online business for years, only lately getting the notoriety that they deserve; but for every threat that is publicised, there are many more that never get the same attention.

New vulnerabilities are discovered at an alarming rate. 394 new vulnerabilities were reported by NIST National Vulnerability Database in recent months, 140 of these vulnerabilities were high severity. A further study showed that around 90% of websites are vulnerable to exploits that could cause data leakage.

The damages hacking can cause can be difficult to quantify, but include lost revenue and expenses incurred while the site is down and being repaired. This will vary depending on how much of your business is conducted online.

How much would you lose if you could no longer accept credit cards online because a SQL injection leaked confidential data from your database? One of the most publicised hacks cost *Sony $170M a couple of years ago.

More difficult to tabulate are the soft costs, such as future business lost due to fickle audience, and brand reputation damage.

If your site is reported to contain malware or cross site scripting vulnerabilities, modern browsers will warn customers away from your site, which can negatively impact search engine rankings (SEO), even to the extent of being quarantined from showing up in any search results.

The Chosen One

How a hacker chooses his victim can be as varied as the attacks that they use. Typically hackers are after your data, bandwidth, or even the thrill of gaining access. There are active markets for credit card numbers and email addresses.

Hackers know that people often reuse passwords, and will use these in conjunction with email addresses to access your customers' other accounts on other sites.

Once a hacker has access to your system they will install backdoor programs to allow them future access even if you patch the vulnerable software. From this point, your server can be used in DoS/DDoS attacks or hacking attempts against other companies who may seek reparations if the attacks are detected.

The most dangerous hacker is one that has a grudge against your company. They will infiltrate your system with the goal of causing as much damage to your business as possible, destroying both your data and reputation in the process.

With the rapid rate that vulnerabilities are discovered, frequent vulnerability scans with a current scanner is vital to ensure that your site remains protected at all times.

In addition to running scans at least every quarter, it is strongly recommended to run a vulnerability scan after making any moderate or larger updates to your site or infrastructure to ensure that no new vulnerabilities have been introduced.

Any decent hacker will use a scanner to check out the vulnerabilities in your site so shouldn't you at least do the same on a regular basis?

  • Sean Power is Manager of Security Operations for DOSarrest Internet Security, a company that specializes in cloud based DDoS mitigation services
http://rss.feedsportal.com/c/669/f/415085/s/364ca2e0/sc/21/mf.gif


http://da.feedsportal.com/r/186529524906/u/49/f/415085/c/669/s/364ca2e0/sc/21/rc/1/rc.img
http://da.feedsportal.com/r/186529524906/u/49/f/415085/c/669/s/364ca2e0/sc/21/rc/2/rc.img
http://da.feedsportal.com/r/186529524906/u/49/f/415085/c/669/s/364ca2e0/sc/21/rc/3/rc.img

http://da.feedsportal.com/r/186529524906/u/49/f/415085/c/669/s/364ca2e0/a2.imghttp://pi.feedsportal.com/r/186529524906/u/49/f/415085/c/669/s/364ca2e0/a2t.imghttp://feeds.feedburner.com/~r/techradar/software-news/~4/4ioAZ1nUYN4
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...