Feeds

Who's riddling Windows PCs with gaping holes? It's your crApps

New study: Microsoft slashes bugs, Java and Adobe bring up the rear

5 things you didn’t know about cloud backup

Nearly nine out of ten security vulnerabilities in Windows computers last year were the fault of popular third-party applications, as opposed to Microsoft's own software.

That's according to security biz Secunia, which analysed flaws found in the most-used 50 Windows programs - 29 from Microsoft (including its operating system family) and 21 from third-party developers.

In 2012, 86 per cent of 2,755 vulnerabilities identified by Secunia's study were found in code developed outside of Microsoft; that's up 8 percentage points on 2011's 78 per cent, we're told. In 2007, the figure was just 57 per cent.

Secunia credited Microsoft for its continued focus on shoring up security measures in its products, and reducing its share of the software vulnerabilities on its Windows platform. The Danish biz added that sysadmins must not forget to roll out updates for all installed code rather than just Microsoft's and the few "usual suspects from other vendors".

Last year, according to Secunia, 5.5 per cent of the vulnerabilities found were present in Windows XP, Vista and Windows 7 operating systems and 8.5 per cent were in Microsoft's user-land programs. In 2011, the numbers were 78 per cent in non-Microsoft code, 10 per cent in Windows OSes and 12 per cent in Microsoft applications.

The number of vulnerabilities tracked by Secunia continues to increase, almost doubling over the last five years. Adobe Flash Player, Adobe Reader and Oracle's Java runtime engine are among the third-party applications included in Secunia's study.

“Companies cannot continue to ignore or underestimate non-Microsoft programs as the major source of vulnerabilities that threaten their IT infrastructure and overall IT-security level. The number of vulnerabilities is on the increase, but many organisations continue to turn a blind eye, thereby jeopardising their entire IT infrastructure: It only takes one vulnerability to expose a company,” said Morten R. Stengaard, Secunia’s director of product management.

The total number of vulnerabilities in the top-50 most popular Windows programs was 1,137 in 2012. Most of these were rated by Secunia as either highly critical (78.8 per cent) or extremely critical (5.3 per cent). Despite the hype about zero-day exploits, 84 per cent of vulnerabilities had a patch available on the day they were disclosed, up from 72 per cent in 2011.

More details on all these figures and more than be found in Secunia's Vulnerability Review 2013 report. The biz collected the figures from anonymised data gathered from system scans by the millions of users of Secunia's patch management software, Personal Software Inspector. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.