Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/9/2009
11:24 AM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Despite Security Concerns, Social Networks Soar

Security firm Palo Alto Networks peeked at the application use of more than 200 organizations around the globe, and found social networking growth on corporate networks is on fire. Will security concerns be the extinguisher? Don't count on it.

Security firm Palo Alto Networks peeked at the application use of more than 200 organizations around the globe, and found social networking growth on corporate networks is on fire. Will security concerns be the extinguisher? Don't count on it.The risks that come along with social networking are well known. And Alexander Wolfe just noted this weekend that Facebook Security Crisis Could Derail Social Nets. It's an important question.

Yet if the Palo Alto Networks Application Usage and Risk Report - which looked at 200 firms from financial services, manufacturing, healthcare, government, retail, and education industries - there's not yet any indication any such derailment.

Most readers of this blog are probably aware - but most social network users are probably not - that sites such as Facebook and blogging services like Twitter are rife with phishing attacks and account hijacks, while many Web applications and services are also vulnerable to attack.

Nonetheless, that's not stopping the rampant growth of these sites and services, from the report:

• Facebook use increased 192 percent while Facebook Chat (released in April 2008) was the fourth most commonly detected chat application, ahead of Yahoo! IM and AIM.

• Twitter session use grew more than 250 percent from the Spring 2009 Application Usage and Risk Report.

• SharePoint collaboration is ubiquitous - bandwidth consumed by SharePoint, specifically the documents component, increased 17-fold from the previous report in April.

• Blogging and wiki editing increased by a factor of 39, while total bandwidth consumed increased by a factor of 48.

Palo Alto Networks studied the technical capabilities of these applications, as well as messaging and conferencing applications - all applications it defines as "Enterprise 2.0" - and found that 70 percent are capable of transferring files, 64 percent have known security vulnerabilities, 28 percent are known to propagate malware, and 16 percent can tunnel other applications.

There it is: despite all of the chatter about security concerns these services are growing exponentially fast - so fast that a logarithmic growth chart - would probably reveal a near straight line up. And this is on corporate networks, where Palo Alto has visibility.

Why that is disappointing that enterprises are not doing much to mitigate that risk. Am I surprised? Hardly. The threats that targeted e-Mail were well-known in the latter half of he 1990s, but it wasn't until the ILOVEYOU virus struck in the spring of 2000 that companies started to take mass-mailer viruses seriously.

The same was true for the network-based attacks in the 1990s. And, more recently, application and specifically Web application - attacks have been documented to be underway, and rising, since the early part of this decade. Web application development and use certainly hasn't slowed despite the state of their security being abysmal.

Now, consider online credit card use and online transactions? Despite dozens of high-profile breaches and millions of credit card and other financial account data being stolen and lost in thousands of incidents - we don't see consumer e-Commerce slowing down any time soon.

My bet: the adoption and security of social networking sites won't be any different.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.