Breaking News

Kioxia Broadens 8th Generation BiCS FLASH SSD Portfolio ASUS Announces Pro WS Platinum Series Power Supplies Razer Hammerhead V3 Wired Earbuds Bring Premium Sound and Comfort to Every Device ASUS ROG Unveils ROG Astral GeForce RTX 5080 Dhahab CORE OC Edition Transcend Introduces 8TB Industrial SSD with Power Loss Protection

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Top 20 computer threats unveiled

Top 20 computer threats unveiled

Enterprise & IT Oct 11,2004 0

The yearly hit parade of hackers' favourite security vulnerabilities has been published.

Issued by the respected Sans Institute, the Top 20 list helps organisations find out if they are closing the most commonly exploited loopholes.

With more than 2,500 software vulnerabilities found every year many organisations need help to know which ones to tackle first.

The list includes loopholes found in both Windows and Unix/Linux software.

Big hitter
"It's a first things first list," said Alan Paller, head of the Sans Institute, a non-profit group which trains and certifies computer security professionals.

"It can be very helpful for people that are trying to fix their vulnerabilities."

He told BBC News Online that it was the list of the vulnerabilities hackers were attacking now.

Each entry in the Top 20 mentions a category of software and the accompanying report fleshes out individual vulnerabilities and what organisations can do to close these holes.

Almost 60% of the loopholes listed this year were in the 2003 Top 20 list. Mr Paller said this was because only half of all organisations bother to patch their systems.

"These vulnerabilities are like little diseases that you cannot wipe out if 50% of people do not have the vaccine," he said.

Mr Paller said we will only see significant changes in the Top 20 when organisations get to the point of finding and fixing vulnerabilities automatically.

Shrinking holes
Gerhard Eschelbeck who studies vulnerabilities for online security firm Qualys said: "It gives people a benchmark to measure themselves against."

He said that better information about vulnerabilities popular with the virus writing and hacking communities can help organisations protect themselves.

"The underground knows this data very well," he said. "We want to level the playing field here between the guys that have the data and the bad intentions and the people that need to know about this so they can do their job effectively."

Mr Eschelbeck's work on vulnerabilities shows that every 21 days, on average, the number of web-facing systems vulnerable to a particular loophole shrinks by 50% as people patch machines.

For internal machines, such as the PCs on workers' desktops, the number shrinks 50% every 62 days.

This difference, said Mr Eschelbeck, comes about because of the sheer number of PCs have on desktops and the time it takes to scan them and see which vulnerabilities they are hosting.

TOP 10 WINDOWS TOP 10 UNIX/LINUX
  1. Web servers & services
  2. Workstation service
  3. Windows remote access services
  4. Microsoft SQL server
  5. Windows authentication
  6. Web browsers
  7. File-sharing applications
  8. LSAS
  9. E-mail programs
  10. Instant messaging
  1. Bind domain name system
  2. Web server
  3. Authentication
  4. Version control systems
  5. Mail transport services
  6. Simple Network Management Protocol (SNMP)
  7. Open secure sockets layer (SSL)
  8. Misconfiguration of enterprise services
  9. Databases
  10. Kernel

From BBC News

Tags: Hacking
Previous Post
Half-Life 2 goes on sale online
Next Post
16X Writers Roundup with Verbatim 16X DVD+R media, updated...

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

Kioxia Broadens 8th Generation BiCS FLASH  SSD Portfolio
Enterprise & IT

Kioxia Broadens 8th Generation BiCS FLASH SSD Portfolio

ASUS Announces Pro WS Platinum Series Power Supplies
PC components

ASUS Announces Pro WS Platinum Series Power Supplies

Razer Hammerhead V3 Wired Earbuds Bring Premium Sound and Comfort to Every Device
Consumer Electronics

Razer Hammerhead V3 Wired Earbuds Bring Premium Sound and Comfort to Every Device

ASUS ROG Unveils ROG Astral GeForce RTX 5080 Dhahab CORE OC Edition
GPUs

ASUS ROG Unveils ROG Astral GeForce RTX 5080 Dhahab CORE OC Edition

Transcend Introduces 8TB Industrial SSD with Power Loss Protection
Enterprise & IT

Transcend Introduces 8TB Industrial SSD with Power Loss Protection

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Noctua NH-D15 G2

Noctua NH-D15 G2

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed