Latest hacker craze of fuzzing poses big headaches for IT managers and software vendors

Software vendors may become overwhelmed by security breaches enabled by Google and AI

Hackers are turning the tools used by software developers to test for bugs against them, according to experts.

Search engine Google and artificial intelligence (AI) tools are being used by those with ill intent to find previously undetected vulnerabilities and exploit them, according to experts at security vendor Secure Computing.

"Why bother creating a new virus, worm or Trojan when you can simply find one and download it using Google," said Paul Henry, vice president of Strategic Accounts, Secure Computing.

"Unskilled hackers can use this previously unknown capability of Google to download malware and release it on the Internet in targeted attacks as if they wrote it themselves to try to impress their peers with their skills,"

Malware search capabilities within Google were previously the privilege of anti-virus vendors and research companies who had program-specific signatures. Now, however, hacking communities are sharing these signatures on the Internet, making them - once catalogued - widely accessible through a simple Google search.

Similarly, AI is currently used by some developers in an automated technique called fuzzing to test applications and fix bugs. But now hackers are turning these prevention aides into vulnerability problems that need curing.

Hackers are then sharing their fuzzing results with their peers through online chat rooms and news groups, rapidly accelerating the threat, according to Secure Computing's findings.

"Fuzzing will clearly accelerate the ability for hackers to discover new vulnerabilities in software applications," said Henry.

"Software vendors were already struggling to keep up with patches for software bugs; the use of Fuzzing tools by hackers and the flood of newly discovered vulnerabilities may overwhelm software vendors' ability to respond with patches."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021