The bad news is that attackers are still primarily exploiting known operating-system and application vulnerabilities to hack into systems.


In InformationWeek’s 2003 U.S. Information Security Survey, only 21% of the 815 companies surveyed say their systems were attacked via “unknown” operating-system vulnerabilities.
Many IT professionals complain that hackers, security researchers, and security vendors who find and disclose software vulnerabilities are just seeking name recognition and free publicity.
Every big worm that has struck so far has exploited a software vulnerability that had previously been discovered and had a patch available to fix it.
As painful as patching is, and despite the toll it takes on system administrators and developers, it may not be as bad as walking into the data center one morning to discover that a worm is tearing its way through the Internet and your systems and that it will be days before anyone figures out how to counter it.
Software and application vulnerabilities aren’t the only programs prone to security attacks. Hackers also are making use of personal identification numbers, account permissions, and valid user passwords, all established to restrict access, in their campaigns.
Of the 815 business-technology and security pros who participated in InformationWeek’s U.S. Information Security Survey this year, nearly one-fourth experienced security incidents involving valid user accounts or permissions.
While nearly one-fourth of the sites surveyed by InformationWeek report recently falling victim to externally waged denial-of-service attacks, 3% report attacks that came from within their firewalls.
More info: [url=http://www.securitypipeline.com/story/showArticle.jhtml?articleID=16100051]http://www.securitypipeline.com/story/showArticle.jhtml?articleID=16100051[/url]