‘Everyday hackers’ are on the rise
Every day hackers seem to be on the rise after research found a Google search for “SQL injection hack” provided 1.74 million results
“Everyday hackers” will become more common due to the increasing availability of hacking advice, according to new research.
According to cyber-security firm Veracode’s annual State of Software Security Report (SoSS), released today a simple Google search for “SQL injection hack” provides 1.74 million results, including videos with explicit instructions on how to exploit SQL injection vulnerabilities.
The ready availability of this information is making it possible for less technically skilled hackers to take advantage of this common flaw and although SQL injection flaws are easy to identify and fix, Veracode found that 32 per cent of web applications are still affected by SQL injection vulnerabilities.
“Despite significant improvements in awareness of the importance of securing software, we are not seeing the dramatic decreases in exploitable coding flaws that should be expected,” says Chris Eng, vice president of research, Veracode.
“For each customer, development team or application that has become more secure, there are an equal number that have not.”
The research concluded that the leading cause of security breaches and data loss for organizations is insecure software and Veracode believes as many as 30 per cent of breaches in 2013 will be from SQL injection attacks.
“Veracode’s 2013 SoSS provides organizations with ways to reduce the success of potential attacks on company infrastructure by understanding the threat to the application layer and outlines the implications of these trends if organizations continue on their current paths,” says Eng.
The report, which includes the latest research on software vulnerability, also found that 70 per cent of software failed to comply with enterprise security policies on their first submission for security testing, indicating that the demand for rapid development means new vulnerabilities are constantly being introduced into organisation’s software portfolio.
“The amount of risk an organization accepts should be a strategic business decision, not the aftermath of a particular development project,” says Chris Wysopal, co-founder and CTO of Veracode.
“The time for organizations to act is now. My hope is that readers will use this research to estimate their current application risk, and then consider how they can act to improve the security posture of their organization by addressing the applications that are currently in development and/or production.”
Download the report here.
"The Internet of Things used to be a buzz phrase in tech circles, but it's already so last century. Brace yourself for the Internet of Everything"
- Can we make further productive use of Wylfa Magnox Nuclear Station site at Angelsey? [01:08 pm 06/12/13]
- Thermal Power Output the Civilian Equivalent to a Submarine Nuclear Reactors [12:31 pm 06/12/13]
- PCB Design Courses [06:51 am 06/12/13]
- basic info [06:48 am 06/12/13]
- MBA advice needed [06:45 am 06/12/13]
Tune into our latest podcast