Vulnerabilities increase in security products

31995 pts.
Tags:
Antivirus
Security
Security products
Bad news for security products as a recent survey by iViZ Security Inc., found that overall vulnerabilities in security products released in 2012 rose at a compound growth rate of an overwhelming 37.3% over the past three years. Antivirus products were #1, coming in with 49% of the software vulnerabilities reported while SQL injection was the least common. Why do you think there was such a high increase for security products?

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Discuss This Question: 6  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TomLiotta
    It's hard to say without seeing the report. The link above doesn't lead to anywhere that the report can be seen. The closest I can get is to a list of vulnerabilities that ends two years ago in May 2011. -- Tom
    125,585 pointsBadges:
    report
  • Kevin Beaver
    I suspect a big part of it is the complexity of these systems/software. Another large component is the visibility and scrutiny these companies get. The bottom line: you need to keep security in mind for your own systems/applications *and* those of others that you use in your environment like I discussed here: http://www.acunetix.com/blog/web-security-zone/risks-associated-with-third-party-software/
    17,440 pointsBadges:
    report
  • TomLiotta
    Complexity is necessarily a part of it. But without seeing the report, there's no way to know how many issues are in established product offerings. in new products that are expanding the market, in products that are effectively cheap knocks-offs that attempt to 'make a buck' or in who knows what. -- Tom
    125,585 pointsBadges:
    report
  • ToddN2000
    Is it possible that with all the news on data breaches and hacks being done that more people are seeing these weaknesses and trying to hack sites them selves. Some people see it as an easy way to make money. Just imagine if you has the skills you could by a cheap laptop for this sole purpose, go to a place that offers free Wi-Fi and you would be pretty hard to trace. You would not leave any personal info behind. The other issue is how quick, to a verified attack, do these companies put out an update of their product?
    13,310 pointsBadges:
    report
  • ToddN2000
    I think most companies are falling behind in the response to update their products. It's amazing how some companies post 2-3 updates a week where others may do one or two a month. It would be hard to validate the test results as it could be a time sensitive issue between product updates. It may also be due a lot more attempts at exploiting software glitches as more and more people are becoming tech savvy. Twenty years ago you did not hear as much about stolen data, cyber attacks and the like. More people seem to be making this a career choice as the payoff can outweigh the risk.
    13,310 pointsBadges:
    report
  • TomLiotta
    "Twenty years ago you did not hear as much...": Much of that is because regulations did not require the same degree of disclosure. Disclosures are required in many more instances today. Companies simply would have kept it quiet in the not too distant past. -- Tom
    125,585 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following