The bad guys on the Internet are narrowing the time frame they need to unleash computer attacks that take advantage of publicly disclosed security holes, new research shows.
More and more of these attacks are coming within 24 hours after a vulnerability is disclosed. That means security flaws are being exploited in Web browsers, computer operating systems and other programs before many people even have had time to learn there's a problem, according to IBM's (NYSE: IBM) latest Internet Security Systems X-Force report.
The report, scheduled to be released Tuesday, looks at the first six months of 2008 and reflects two growing trends in Internet-based threats.