‘Everyday hackers’ are on the rise
Every day hackers seem to be on the rise after research found a Google search for “SQL injection hack” provided 1.74 million results
“Everyday hackers” will become more common due to the increasing availability of hacking advice, according to new research.
According to cyber-security firm Veracode’s annual State of Software Security Report (SoSS), released today a simple Google search for “SQL injection hack” provides 1.74 million results, including videos with explicit instructions on how to exploit SQL injection vulnerabilities.
The ready availability of this information is making it possible for less technically skilled hackers to take advantage of this common flaw and although SQL injection flaws are easy to identify and fix, Veracode found that 32 per cent of web applications are still affected by SQL injection vulnerabilities.
“Despite significant improvements in awareness of the importance of securing software, we are not seeing the dramatic decreases in exploitable coding flaws that should be expected,” says Chris Eng, vice president of research, Veracode.
“For each customer, development team or application that has become more secure, there are an equal number that have not.”
The research concluded that the leading cause of security breaches and data loss for organizations is insecure software and Veracode believes as many as 30 per cent of breaches in 2013 will be from SQL injection attacks.
“Veracode’s 2013 SoSS provides organizations with ways to reduce the success of potential attacks on company infrastructure by understanding the threat to the application layer and outlines the implications of these trends if organizations continue on their current paths,” says Eng.
The report, which includes the latest research on software vulnerability, also found that 70 per cent of software failed to comply with enterprise security policies on their first submission for security testing, indicating that the demand for rapid development means new vulnerabilities are constantly being introduced into organisation’s software portfolio.
“The amount of risk an organization accepts should be a strategic business decision, not the aftermath of a particular development project,” says Chris Wysopal, co-founder and CTO of Veracode.
“The time for organizations to act is now. My hope is that readers will use this research to estimate their current application risk, and then consider how they can act to improve the security posture of their organization by addressing the applications that are currently in development and/or production.”
Download the report here.
"Asimov's three laws of robotics debuted in a story set this year, in 2015. Will real robots be most like Robby, Terminator or the Synths?"
- 3D printing to improve properties of optical fibres
- Siemens launches largest hydrogen energy storage plant
- Redacted fracking report finally reveals risks
- Global mobile payment app developed for public transport
- Contactless micro-donations raise £30K for London youth charities
- Solar power generation to hit 15 per cent during open day
- Test [06:22 pm 20/03/15]
- Test [06:20 pm 20/03/15]
- What to Specialise in Electronics Engineering?? [03:02 am 03/04/14]
- Britain to have just one remaining coal pit by the end of 2015 [01:11 am 03/04/14]
- LV Generator Star point earthing - UK [08:35 pm 02/04/14]