Slide Show: The Vulnerability 'Usual Suspects' Of 2012
Here's the list of applications, companies, and targets that dominated vulnerability and exploit headlines in 2012
According to Kaspersky Lab Securelist, Adobe Acrobat Reader was only behind Java in the list of applications with the most targeted vulnerabilities last quarter. Attacks against the PDF program made up 25 percent of all Web exploits. Creativity is rewarded in attacks against PDFs. For example, at the BSides conference this year, one researcher demonstrated how SQL injection attacks could be made against websites serving PDFs that could offer up a number of nasty malformed versions of legitimate-seeming documents.
Free Research and Reports
- Three Principles to Improve Data Security and Compliance
- Aligning IT with strategic business goals: A proactive approach to managing IT risk to your business
- Connecting the Dots: Are You Seeing the Complete Big Data Picture?
- How crowdsourced testing has changed the game for innovative software companies
- Ensuring Your Apps Work in the Real World
- Information Streams - Going Beyond the Activity Stream - E2 Conference Boston
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- How to Choose a SaaS Vendor - E2 Conference Boston
- The A-to-Z of Building Your Big Data Initiative - E2 Conference Boston - E2 Conference Boston
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston