Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:24 AM
George V. Hulme
George V. Hulme

Despite Security Concerns, Social Networks Soar

Security firm Palo Alto Networks peeked at the application use of more than 200 organizations around the globe, and found social networking growth on corporate networks is on fire. Will security concerns be the extinguisher? Don't count on it.

Security firm Palo Alto Networks peeked at the application use of more than 200 organizations around the globe, and found social networking growth on corporate networks is on fire. Will security concerns be the extinguisher? Don't count on it.The risks that come along with social networking are well known. And Alexander Wolfe just noted this weekend that Facebook Security Crisis Could Derail Social Nets. It's an important question.

Yet if the Palo Alto Networks Application Usage and Risk Report - which looked at 200 firms from financial services, manufacturing, healthcare, government, retail, and education industries - there's not yet any indication any such derailment.

Most readers of this blog are probably aware - but most social network users are probably not - that sites such as Facebook and blogging services like Twitter are rife with phishing attacks and account hijacks, while many Web applications and services are also vulnerable to attack.

Nonetheless, that's not stopping the rampant growth of these sites and services, from the report:

• Facebook use increased 192 percent while Facebook Chat (released in April 2008) was the fourth most commonly detected chat application, ahead of Yahoo! IM and AIM.

• Twitter session use grew more than 250 percent from the Spring 2009 Application Usage and Risk Report.

• SharePoint collaboration is ubiquitous - bandwidth consumed by SharePoint, specifically the documents component, increased 17-fold from the previous report in April.

• Blogging and wiki editing increased by a factor of 39, while total bandwidth consumed increased by a factor of 48.

Palo Alto Networks studied the technical capabilities of these applications, as well as messaging and conferencing applications - all applications it defines as "Enterprise 2.0" - and found that 70 percent are capable of transferring files, 64 percent have known security vulnerabilities, 28 percent are known to propagate malware, and 16 percent can tunnel other applications.

There it is: despite all of the chatter about security concerns these services are growing exponentially fast - so fast that a logarithmic growth chart - would probably reveal a near straight line up. And this is on corporate networks, where Palo Alto has visibility.

Why that is disappointing that enterprises are not doing much to mitigate that risk. Am I surprised? Hardly. The threats that targeted e-Mail were well-known in the latter half of he 1990s, but it wasn't until the ILOVEYOU virus struck in the spring of 2000 that companies started to take mass-mailer viruses seriously.

The same was true for the network-based attacks in the 1990s. And, more recently, application and specifically Web application - attacks have been documented to be underway, and rising, since the early part of this decade. Web application development and use certainly hasn't slowed despite the state of their security being abysmal.

Now, consider online credit card use and online transactions? Despite dozens of high-profile breaches and millions of credit card and other financial account data being stolen and lost in thousands of incidents - we don't see consumer e-Commerce slowing down any time soon.

My bet: the adoption and security of social networking sites won't be any different.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-22
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inab...
PUBLISHED: 2020-10-22
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
PUBLISHED: 2020-10-22
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
PUBLISHED: 2020-10-21
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the "publisher" component's admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal b...
PUBLISHED: 2020-10-21
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.