According to the results of newly released research, threats targeting instant messaging (IM) and peer-to-peer (P2P) applications rose significantly in the first quarter of 2006 compared to the same period last year.
The findings come from research
The company examined what it calls "greynets," programs installed on a system without permission from IT departments that are adept at evading existing security tools. The company considers instant messaging IM, peer-to-peer and spyware as greynet programs. Data used in the company's analysis came from server log files maintained by its lab. Each individual incident report represents the detection of a security issue impacting one or more real-time communications channels on one day, FaceTime said.
"The number of threats across multiple P2P and IM channels demonstrates the need for a comprehensive approach to managing threats," Tyler Wells, FaceTime's research director, said in a statement. "As malware creators increasingly attack these mainstream applications, administrators should ensure they have the ability to control and manage them."
Based on the criteria, FaceTime painted the following picture for the first quarter:
FaceTime's report is the latest to show a surge in the level of malware targeting real-time communications programs.
In February, Waltham, Mass.-based IMlogic Inc. and San Diego-based Akonix Systems Inc. released reports showing a dramatic spike in IM threats last year and an IT community that has yet to achieve an adequate defense.
IMlogic reported a 1,700% increase in reported incidents in 2005, compared to all reported incidents in 2004. Meanwhile, Akonix surveyed more than 100 organizations and found that IM threats aren't on the radar screen for most of them. Only 11% reported having IM security tools in place, compared to 73% who use e-mail security programs. Incredibly, the company said, almost 50% of respondents replied that "an IM hygiene solution never crossed my mind."
IT professionals have long lamented that it's difficult to block IM threats, since most programs are installed by end users and are hard to monitor.