Top list of vulnerable applications
Most Internet attacks are currently trying to exploit vulnerabilities: they are trying to infiltrate computers through vulnerabilities in popular applications, primarily targeting operating systems, browsers, office suites, and music players.
Kaspersky Lab has identified five major vulnerabilities that are targeted by cybercriminals. Examining the activities of malicious programs in the third quarter of 2012 study has shown that more than half of the attacks exploit Java vulnerabilities. There are several reasons for the increased attention of cybercriminals on this platform. On the one hand, software updates can be installed on demand instead of automatic updating, which increases the lifespan of vulnerabilities, on the other hand, Java vulnerabilities are relatively easy to exploit on any version of Windows, and with a little work criminals can create cross-platform exploits (such as Flashfake ).
Attacks through Adobe Reader are in second place, accounting for a quarter of all blocked attacks. The popularity of Adobe Reader among cybercriminals is gradually declining due to the relatively simple mechanism that provides vulnerability detection and automatic updates thanks to the latest version of the software. In addition, attacks targeting vulnerabilities in Windows Help and Support Center, as well as various Internet Explorer (IE) errors, accounted for 3 percent of all attacks.
Cybercriminals have been researching Flash Player bugs for years. THE Kaspersky Security Network according to the third quarter of 2012, two of the top 10 vulnerabilities belong to AdobeFlash. The top five are complemented by exploits targeting devices running the Android operating system. They are primarily directed against “jailbreak” devices to give any software, whether original or malicious, full access to the memory and features of your phone or tablet.