Monday, March 16, 2015

More vulnerabilities in computer programs – FAZ – Frankfurter Allgemeine Zeitung

      

 
 
 
 
 
     
 
 
 
 
 
 
 
 
         

 
 
 
 
 
          Browsers such as Internet Explorer or Google Chrome are the most common target for hackers .
     

 
                                           
 
 
     
     
     
         
         
                                                             

The number of vulnerabilities in computer programs has increased significantly, according to a study in recent years. The end of 2014 about 6,500 software vulnerabilities were known, and is 2000 more than in 2011, according to a study by the Potsdam Hasso Plattner Institute (HPI), which will be presented at CeBIT in Hannover on Monday. Thus, the value lies currently only slightly below the previous highs of 2006 and of 2008.


                         
         
         
                                                             
                                 

In almost 70 percent of cases, the vulnerabilities affect the confidentiality of programs according to the HPI – that is, they allow an attacker to read sensitive data such as passwords. Currently, would take to weaknesses, notably classified as moderate; Vulnerabilities of the highest severity would, however, rare. HPI Director Christoph Meinel explained that the software maker had at last endeavored “to eliminate the most critical gaps”.


                         
         
         
                                                             

Under the operating systems Windows XP has, according to the analysis of the most critical vulnerabilities, namely well 500. The program will be offered no more security updates since April 2014 but it is still used.


                         
         
         
                                                             

Browser is the point

According to the HPI For application programs account for particularly large number of critical vulnerabilities in the browser: For Internet Explorer from Microsoft were 700 of these vulnerabilities have been counted in Chrome by Google 600 and the Firefox Mozilla 570 . “The presentation software for Internet content is increasingly complex, because websites can handle various multimedia formats and additional dynamic content and more often have to,” said Meinel. Therefore, growing the risk of vulnerabilities.


                         
         
         
                                                                                                                                                                                                  

More about

browsers are Meinel, according to the most commonly used target for hackers – finally moved the users using this programs on the internet, so that offer an approach for attacks here.

                         
         
         
                                                             

The HPI gathers for its database for 15 years on the Internet freely available information on software vulnerabilities and -Problems. The collection is reported to be updated several times a day.


                         
         
         
                                                             

The Protection of the Constitution provides for German politics and economics in sight

Also, the Federal Constitutional protection made in the morning at the Cebit vulnerabilities in the network aware “of foreign intelligence services operate still a lot of effort to spy on our country” said Jadran Mesic. He is responsible for counterintelligence department heads Protection of the Constitution. Every day there are between 2000 and 3000 alone attacks on the network of the federal government – at least five of them there is strong suspicion of activities of foreign intelligence services. Mesic: “It would be wrong to attribute such activities in the Western intelligence services.”


                         
         
         
                                                             

The secret spies had. In Germany especially automotive and defense companies and research institutions in their sights Another phenomenon: International conflict situations can be fueled by digital activities. “The manipulation of human experiences a high degree of attention,” said Mesic. On the first public day of the world’s largest computer fair CeBIT in Hannover was the data security one of the focal points of the industry show.


                                                                             
 
  
 
 
 
                       

Here you can buy the rights to this article

Cyber-security No one is prepared to IT attacks

For President Obama Melissa Hathaway has laid the foundation of its Internet strategy. Now she warns hackers and cyber warriors could paralyze electricity and water supply. More From Lorenz Hemicker and Patrick Bernau, Berlin

03/09/2015, 12:58 pm clock | Economy

W-Lan Home Free Internet in the Moscow Metro

In the Russian capital, the Metro offers its customers free W -lan, so they can surf without interruption. And above the earth booming Russian software industry More

08/12/2014, 15:29 clock . | Economy

Ukraine Crisis comes with Internet war continues

There is an undeclared war that takes place every day on the Internet. The IT security firm Virtual Systems in Kiev with its own software protects against hacker attacks. It is a battle against invisible windmills, the more extensive and more and more technical effort has to be. More

12/17/2014, 12:00 clock | Economy

Cebit initiatives More security for mobile and email

Encrypted e-mails, secure Internet access and counter-intelligence:
 On the IT fair CeBIT, the telecommunications companies Vodafone and Telecom present initiatives for safety. But not only do they have ideas
More

15/03/2015, 14:31 clock |. Economy

     
     
     

 

posting Send email

HPI study

More vulnerabilities in computer programs

has the number of software vulnerabilities increases sharply. Attacker can thus read sensitive data such as passwords. Often they come from the browser.

An error has occurred. Please check your input

<- ========= confirmation page.! Will be loaded by JS if submission is successful === ============ ->

posting Send email

Thanks
The article was sent successfully

.

LikeTweet

No comments:

Post a Comment