Select Page

Top list of vulnerable applications

 

Most Internet attacks are currently trying to exploit vulnerabilities: they are trying to infiltrate computers through vulnerabilities in popular applications, primarily targeting operating systems, browsers, office suites, and music players.

Top list of vulnerable applications 1


Kaspersky Lab has identified five major vulnerabilities that are targeted by cybercriminals. Examining the activities of malicious programs in the third quarter of 2012 study has shown that more than half of the attacks exploit Java vulnerabilities. There are several reasons for the increased attention of cybercriminals on this platform. On the one hand, software updates can be installed on demand instead of automatic updating, which increases the lifespan of vulnerabilities, on the other hand, Java vulnerabilities are relatively easy to exploit on any version of Windows, and with a little work criminals can create cross-platform exploits (such as Flashfake ). 

serumek applications

Attacks through Adobe Reader are in second place, accounting for a quarter of all blocked attacks. The popularity of Adobe Reader among cybercriminals is gradually declining due to the relatively simple mechanism that provides vulnerability detection and automatic updates thanks to the latest version of the software. In addition, attacks targeting vulnerabilities in Windows Help and Support Center, as well as various Internet Explorer (IE) errors, accounted for 3 percent of all attacks.

Cybercriminals have been researching Flash Player bugs for years. THE Kaspersky Security Network according to the third quarter of 2012, two of the top 10 vulnerabilities belong to AdobeFlash. The top five are complemented by exploits targeting devices running the Android operating system. They are primarily directed against “jailbreak” devices to give any software, whether original or malicious, full access to the memory and features of your phone or tablet.

 

 

About the Author

s3nki

Owner of the HOC.hu website. He is the author of hundreds of articles and thousands of news. In addition to various online interfaces, he has written for Chip Magazine and also for the PC Guru. For a time, he ran his own PC shop, working for years as a store manager, service manager, system administrator in addition to journalism.