Slide Show: The Vulnerability 'Usual Suspects' Of 2012
Here's the list of applications, companies, and targets that dominated vulnerability and exploit headlines in 2012
According to Kaspersky Lab Securelist, Adobe Acrobat Reader was only behind Java in the list of applications with the most targeted vulnerabilities last quarter. Attacks against the PDF program made up 25 percent of all Web exploits. Creativity is rewarded in attacks against PDFs. For example, at the BSides conference this year, one researcher demonstrated how SQL injection attacks could be made against websites serving PDFs that could offer up a number of nasty malformed versions of legitimate-seeming documents.
Free Research and Reports
- The Language of UX: Beyond Buzzwords -
- Discover the opportunities and challenges associated with mobile retail - Mobile Commerce World - Mobile Commerce World
- Get practical information on how to develop your organization's mobile commerce application - Mobile Commerce World - Mobile Commerce World
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
Dark Reading Digital Magazine
In This Issue
- Endpoint Security: End user security requires layers of tools and training as employees use more devices and apps.
- Security Isn't A Piece Of Cake: It's time we rethink the conventional wisdom about security layering.
- BYOD Is Here To Stay: Trying to keep employees' devices off the network is futile.