• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Whitepapers
  • Data Strategy Spotlight
  • Newsletters
  • Whitepapers
    • Inqlogo 120x194
      Five things you should look for in choosing a Testing provider

      Choosing a Testing Partner can be complex.  So what do you look for?  This guide offers insight into the qualities you must look for in choosing a Testing provider.  Download now to learn more.

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • Data Strategy Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Trending
  • MWC 2019
  • Article 13
  • AMD Radeon VII
  • Galaxy S10
  • Nvidia GTX 1660 Ti 
The Inquirer
  • Security

Adobe beats Microsoft in PC vulnerability top 10

Criminals like Acrobat, Reader, Flash and Shockwave

  • Asavin Wattanajantra
  • 19 May 2011
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

SECURITY OUTFIT Kaspersky Lab has reported that Adobe applications dominated its top 10 vulnerabilities list for the first quarter of 2011, occupying five positions including first and second places.

In first place was an Adobe Acrobat Reader buffer flow vulnerability, which was found on 40.78 per cent of infected computers, according to Kaspersky Lab figures. Flash Player vulnerabilities took second and third place, while more Reader and Acrobat flaws as well as a Shockwave Player issue took two other places in the top 10.

Kaspersky said that last year most of the list was populated by Microsoft product issues, but there was only one in the latest top 10, a Microsoft Office handling vulnerability in eighth place.

The report also confirmed Microsoft findings from last year, which revealed that criminals were seeing the Java virtual machine as an increasing worthwhile target. Vulnerabilities in the Java JDK/JRE/SDK took the fourth and fifth spots. Apple Quicktime and Winamp vulnerabilities took sixth and seventh places in the top 10 list.

All the vulnerabilities allowed criminals to take control of a computer at the system level if successful. In total, Kaspersky found 28,752,203 vulnerable applications on computers it analysed.

The beginning of 2011 saw a continuing trend for cyber criminals to attack major corporations rather than home computers, due to the financial rewards available. Sony of course was one of the big companies to find this out recently.

"This is more risky for the attackers because unlike home users, major corporations can and will retaliate," the report said. "However, the stakes and thus the potential rewards involved with targeted attacks on corporations are higher and there are fewer competitors in this segment of the black market."

And referring to attacks on other security companies HBGary and RSA Kaspersky complained, "It is alarming that IT security companies are the focus of so many attacks."

"Such companies usually serve huge numbers of customers and a successful attack may provide cybercriminals with keys to the digital wallets of large numbers of users in different parts of the world," it warned. µ

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Security

INQ Latest

Google Updates: Bye-bye Fit for web, no more forced arbitration and I/O ballot open
Google Updates: Bye-bye Fit for web, no more forced arbitration and I/O ballot open

It's the week in Google

  • Software
  • 22 February 2019
O2 has plans for 5G in four UK cities this year
O2 has plans for 5G in four UK cities this year

You can probably guess which

  • Cellular
  • 22 February 2019
Nvidia's GTX 1660 Ti brings Turing power to gamers on a budget
Nvidia's GTX 1660 Ti brings Turing power to gamers on a budget

GPU is available in Blighty now for £260

  • Graphics
  • 22 February 2019
Microsoft might bring Xbox Games Pass to the Nintendo Switch
Microsoft might bring Xbox Games Pass to the Nintendo Switch

Move could bring Halo and Gears of War to the hybrid console

  • Numb Thumbs
  • 22 February 2019
Back to Top

Most read

Galaxy S10 price, release date and specs: S10, S10+ and S10e pre-orders begin
Galaxy S10 price, release date and specs: S10, S10+ and S10e pre-orders begin
iPhone 11 release date, specs and price: 2019 iPhones might offer reverse wireless charging
iPhone 11 release date, specs and price: 2019 iPhones might offer reverse wireless charging
Glorious Leader Donald Trump ushers in golden age of 6G internet for adoring American subjects
Glorious Leader Donald Trump ushers in golden age of 6G internet for adoring American subjects
Intel expects Apple to shift to ARM-based Mac chips in 2020
Intel expects Apple to shift to ARM-based Mac chips in 2020
O2 has plans for 5G in four UK cities this year
O2 has plans for 5G in four UK cities this year
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017