IBM X-Force Says Mobile Vulnerabilities Are Here and Growing

IBM released the results of its X-Force 2011 Mid-Year Trend and Risk Report finding that the security landscape is ridden with high-profile attacks, mobile vulnerabilities and more sophisticated threats such as “whaling.” The report is based on intelligence gathered through IBM’s research including monitoring and analyzing 12 billion security events since the beginning of 2011.

The trend of bringing mobile devices to work is growing and with it, the vulnerability and risk of security issues. X-Force projects that 2011 will see double the amount of 2010 mobile exploits and has recommended that IT teams consistently employ anti-malware for phones.

“For years, observers have been wondering when malware would become a real problem for the latest generation of mobile devices,” said Tom Cross, manager of Threat Intelligence and Strategy for IBM X-Force. “It appears that the wait is over.”  

Not only are mobile attacks an increased concern, but it seems attacks and network compromises are two with critical vulnerabilities tripled in 2011, according to X-Force. This includes whaling, attacks from hacktivists, anonymous proxies and Advanced Persistent Threats. 

“The rash of high-profile breaches this year highlights the challenges organizations often face in executing their security strategy,” said Cross. “Although we understand how to defend against many of these attacks on a technical level, organizations don’t always have the cross-company operational practices in place to protect themselves.” 

Additionally, IBM is opening the Institute for Advanced Security for Asia Pacific joining the IBM Institutes in North America and Europe. The center will assist in combat against security risks and create collaboration amongst security leaders. 

Additionally, IBM is opening the 

Filed in: Cyber, Industry News, Mobility Tags: , , , , , , , ,

You might like:

Anne Altman: Gov’t Wants to Merge Data Sources as IBM Makes Federal Health Investments Anne Altman: Gov’t Wants to Merge Data Sources as IBM Makes Federal Health Investments
Ginni Rometty, Charlie Thomas and Chris Checco on the Disruptive Power of Real-Time Personalization, Predictive Analytics and Cognitive Computing Ginni Rometty, Charlie Thomas and Chris Checco on the Disruptive Power of Real-Time Personalization, Predictive Analytics and Cognitive Computing
IBM Unveils New Cloud Storage Platform Offering IBM Unveils New Cloud Storage Platform Offering
IBM Cloud, Analytics Selected for British Columbia Ocean Mgmt Project IBM Cloud, Analytics Selected for British Columbia Ocean Mgmt Project

One Response to "IBM X-Force Says Mobile Vulnerabilities Are Here and Growing"

  1. Marilyn says:

    Mobile Companies need to start to have the proper operational practices in place to protect the consumer.  With personal computers we can protect ourselves by taking the proper measures using software programs to maintain our computer security.  When it comes to anything mobile there are very few options we have to protect our security.  As we become more dependent on this technology companies need to take the lead and protect their consumers.

Leave a Reply

Submit Comment

© 2014 ExecutiveBiz. All rights reserved.

A Digest of ExecutiveBiz's Daily Coverage of GovCon

  • Executive Analysis
  • Technology & Innovation
  • Business

Sign up for the ExecutiveBiz Digest