This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Unpatched PCs remain a threat

Share this article:

An unpatched PC is a greater threat than any zero-day vulnerability.

Speaking at the Infosecurity Europe press conference, Stefan Frei, research analyst director at Secunia, said that the number of vulnerabilities had been relatively stable but high over the last few years, and that two vendors accounted for 20 per cent of all vulnerabilities.

He said: “The PC is increasingly targeted, you can protect the server as it is a static environment as it does not surf or install technologies but the endpoint is dynamic and you work with the data on desktop as that is where the data sits.”

Focusing on programs installed by PC users, Secunia research found that 50 per cent of users have more than 66 programs from over 22 vendors installed, what Frei called a 'big impact on how to protect your machine'.

He said that taking the top 50 most prevalent programs, 25 are from Microsoft, while 24 are from third parties from 14 different vendors.

In terms of the evolution of the vulnerability, he said that since 2007 the number of vulnerabilities affecting the Windows XP platform increased threefold to 729 by the end of 2010. “Most of the vulnerabilities are exploitable remotely, so who is responsible? When we analysed this we found that third party software is almost exclusively responsible for the trend,” he said.

In terms of how to protect against this problem, Frei said that the equation is: hosts x vulnerabilities x complexity = opportunity for cyber crime. Therefore users need to adjust their model.

He said: “Microsoft is less than two per cent insecure, while third party software is eight to 12 per cent insecure. The complexity to keep endpoints secure and install patches has a direct impact on your security level.

“If the cyber criminal sees that one batch gets detected then they release the next batch, so they are ahead of defence technologies. Malware is prevalent and can be used to pass anti-virus. A patch provides better protection than thousands of signatures as it eliminates the root cause, no matter how many variants, the vulnerability is patched so there is no way to get in and there is no reason not to act upon it.”

He concluded by saying that cyber criminals do not need a Microsoft vulnerability to attack a PC as they can work without them; they do not need a zero-day or to pay for it as there are plenty of opportunities by exploiting an unpatched PC.

“Patching is still seen as a secondary measure. I think we can do a lot more,” he said.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

GCHQ 'spied on Germany's Deutsche Telekom'; Germans sell spyware

GCHQ 'spied on Germany's Deutsche Telekom'; Germans sell ...

UK and US spies reported to spy on Deutsche Telekom in Snowden documents, while Germany's FinFisher accused of supplying surveillance software to repressive regimes.

Amazon's £600m Twitch gaming site hit by malware

Amazon's £600m Twitch gaming site hit by malware

The Twitch.tv online gaming platform, which is now owned by Amazon and has more than 55 million monthly viewers, has been infected with malware that spends users' money without their ...

China's cyber spying 'production line' approach no game for amateurs

China's cyber spying 'production line' approach no game ...

Chinese cyber-spying production line shares tools and tactics between different groups suggesting cooperation or at least similar training.