• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Whitepapers
  • Industry Voice
  • SMB Spotlight
  • Newsletters
  • Whitepapers
    • Inq-logo-120x194
      The new standard in wireless networks and supporting the future needs of clients

      802.11n is certainly not dead and whilst manufacturers are still recommending 802.11n deployments, enterprise IT managers should give some thought to and make plans for the eventual implementation of 802.11ac. This white paper discusses how 802.11ac is being designed to meet the demands of clients in the future, help you understand the technology, what is likely to happen in the transition from 802.11n to ac and how you can get ready to meet these new demands.

      Download
      Inq-logo-120x194
      A holistic view of application performance

      Enterprise organisations are constantly being asked to do more work with fewer people, as the size and complexity of infrastructure and applications continue to grow unabated. This guide is intended for companies, organisations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end user perspective.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • SMB Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
The Inquirer
  • Security

Adobe beats Microsoft in PC vulnerability top 10

Criminals like Acrobat, Reader, Flash and Shockwave

  • Asavin Wattanajantra
  • 19 May 2011
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

SECURITY OUTFIT Kaspersky Lab has reported that Adobe applications dominated its top 10 vulnerabilities list for the first quarter of 2011, occupying five positions including first and second places.

In first place was an Adobe Acrobat Reader buffer flow vulnerability, which was found on 40.78 per cent of infected computers, according to Kaspersky Lab figures. Flash Player vulnerabilities took second and third place, while more Reader and Acrobat flaws as well as a Shockwave Player issue took two other places in the top 10.

Kaspersky said that last year most of the list was populated by Microsoft product issues, but there was only one in the latest top 10, a Microsoft Office handling vulnerability in eighth place.

The report also confirmed Microsoft findings from last year, which revealed that criminals were seeing the Java virtual machine as an increasing worthwhile target. Vulnerabilities in the Java JDK/JRE/SDK took the fourth and fifth spots. Apple Quicktime and Winamp vulnerabilities took sixth and seventh places in the top 10 list.

All the vulnerabilities allowed criminals to take control of a computer at the system level if successful. In total, Kaspersky found 28,752,203 vulnerable applications on computers it analysed.

The beginning of 2011 saw a continuing trend for cyber criminals to attack major corporations rather than home computers, due to the financial rewards available. Sony of course was one of the big companies to find this out recently.

"This is more risky for the attackers because unlike home users, major corporations can and will retaliate," the report said. "However, the stakes and thus the potential rewards involved with targeted attacks on corporations are higher and there are fewer competitors in this segment of the black market."

And referring to attacks on other security companies HBGary and RSA Kaspersky complained, "It is alarming that IT security companies are the focus of so many attacks."

"Such companies usually serve huge numbers of customers and a successful attack may provide cybercriminals with keys to the digital wallets of large numbers of users in different parts of the world," it warned. µ

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Security

INQ Latest

tides-of-war-made-with-unity
Facebook strikes gaming deal with Unity in direct challenge to Valve and Microsoft

Because everyone loves games that demand in-app purchases, right?

  • Games
  • 18 August 2016
New Apple MacBook
Incoming MacBook Pro upgrade is not expected to have Intel Kaby Lake chips

Prepare for outcry

  • Hardware
  • 18 August 2016
DNS graffiti in Istanbul
US confirms it will hand over control of DNS to ICANN from October

Not that you'll notice the difference

  • Software
  • 18 August 2016
mcdonalds-wifi-gratis
McDonald's takes away Happy Meal tracking toy giveaway

Skin crawling stuff

  • Friction
  • 18 August 2016
blog comments powered by Disqus
Back to Top

Most read

Samsung Galaxy Note 4 - pen
Galaxy Note 7 vs Galaxy Note 4
New Apple MacBook
Incoming MacBook Pro upgrade is not expected to have Intel Kaby Lake chips
Galaxy Note 7
Galaxy Note 7 release date, price and specs
hopscotch
Oracle claims it didn't know Android was coming to Chrome OS
Windows 10 Start Menu
How to fix Windows 10 Anniversary Update
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Media Investments Limited 2015

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016