VoIP and IE risks star in SANS' threat list

Protect and survive

homeless man with sign

The SANS Institute released its annual Top 20 internet security risk list on Wednesday.

Unlike previous editions of the long-running list, many security risks highlighted in the run-down are not dependent on operating system security bugs.

VoIP service and phones, threats posed by fraudulent phishing emails, and web application flaws all figure prominently in the run down. Operating system and software application-related vulnerabilities still pose a serious threat, of course, and it's no surprise that Internet Explorer appears at the top of this list.

A special category in the run-down highlights the threat posed by so-called zero-day vulnerabilities, security bugs that are the subject of attacks before vendors have gotten around to issuing a patch.

The list, compiled by the SANS Institute in association with organisations such as the FBI, is designed to help sys admins prioritise security remediation work so they concentrate on the issues which pose the greatest threat to their organisations. The full run-down can be found here. ®




More from The Register

Network kit biz Phoenix takes heat as flaws may leave industrial control system security in ashes

Oil, gas, maritime systems affected by latest bug findings
spectre

Ready for another fright? Spectre flaws in today's computer chips can be exploited to hide, run stealthy malware

Honey, I've shrunk the spyware and concealed it with speculative execution
Java microservice, photo via Shutterstock

Security storm brewing for Oracle Java-powered smart cards: More than a dirty dozen flaws found, fixes... er, any fixes?

Vuln hunters warn malicious applets can bust through protections, snoop on or hijack access gizmos
Finding bugs in code

Patch me, if you can: Grave TCP/IP flaws in FreeRTOS leave IoT gear open to mass hijacking

AWS-stewarded net-connected platform has multiple remote code execution vulnerabilities
shutterstock_mobile_theft_648

Nice phone account you have there – shame if something were to happen to it: Samsung fixes ID-theft flaws

If Artem Moskowsky owes you money, it's a good time to ask
Woman telling you to be quiet

Boffin suggests Trappist monk approach for Spectre-Meltdown-grade processor flaws, other security holes: Don't say anything public – zip it

Prof asks: What good comes from letting everyone know a vulnerability exists?
A ghost

Data-spewing Spectre chip flaws can't be killed by software alone, Google boffins conclude

While browsers have got their act together, any other apps interpreting user-supplied code need to be aware of this
a chip and a lock

Buffer the Intel flayer: Chipzilla, Microsoft, Linux world, etc emit fixes for yet more data-leaking processor flaws

Intel CPUs dating back a decade are vulnerable to latest cousin of Spectre

Biting the hand that feeds IT © 1998–2019