Feeds

Who's riddling Windows PCs with gaping holes? It's your crApps

New study: Microsoft slashes bugs, Java and Adobe bring up the rear

Using blade systems to cut costs and sharpen efficiencies

Nearly nine out of ten security vulnerabilities in Windows computers last year were the fault of popular third-party applications, as opposed to Microsoft's own software.

That's according to security biz Secunia, which analysed flaws found in the most-used 50 Windows programs - 29 from Microsoft (including its operating system family) and 21 from third-party developers.

In 2012, 86 per cent of 2,755 vulnerabilities identified by Secunia's study were found in code developed outside of Microsoft; that's up 8 percentage points on 2011's 78 per cent, we're told. In 2007, the figure was just 57 per cent.

Secunia credited Microsoft for its continued focus on shoring up security measures in its products, and reducing its share of the software vulnerabilities on its Windows platform. The Danish biz added that sysadmins must not forget to roll out updates for all installed code rather than just Microsoft's and the few "usual suspects from other vendors".

Last year, according to Secunia, 5.5 per cent of the vulnerabilities found were present in Windows XP, Vista and Windows 7 operating systems and 8.5 per cent were in Microsoft's user-land programs. In 2011, the numbers were 78 per cent in non-Microsoft code, 10 per cent in Windows OSes and 12 per cent in Microsoft applications.

The number of vulnerabilities tracked by Secunia continues to increase, almost doubling over the last five years. Adobe Flash Player, Adobe Reader and Oracle's Java runtime engine are among the third-party applications included in Secunia's study.

“Companies cannot continue to ignore or underestimate non-Microsoft programs as the major source of vulnerabilities that threaten their IT infrastructure and overall IT-security level. The number of vulnerabilities is on the increase, but many organisations continue to turn a blind eye, thereby jeopardising their entire IT infrastructure: It only takes one vulnerability to expose a company,” said Morten R. Stengaard, Secunia’s director of product management.

The total number of vulnerabilities in the top-50 most popular Windows programs was 1,137 in 2012. Most of these were rated by Secunia as either highly critical (78.8 per cent) or extremely critical (5.3 per cent). Despite the hype about zero-day exploits, 84 per cent of vulnerabilities had a patch available on the day they were disclosed, up from 72 per cent in 2011.

More details on all these figures and more than be found in Secunia's Vulnerability Review 2013 report. The biz collected the figures from anonymised data gathered from system scans by the millions of users of Secunia's patch management software, Personal Software Inspector. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.