<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Cristian Florian</title>
	<atom:link href="http://www.gfi.com/blog/author/cristian-florian/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Report: The Most Vulnerable Operating Systems and Applications in 2012</title>
		<link>http://www.gfi.com/blog/report-the-most-vulnerable-operating-systems-and-applications-in-2012/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-the-most-vulnerable-operating-systems-and-applications-in-2012</link>
		<comments>http://www.gfi.com/blog/report-the-most-vulnerable-operating-systems-and-applications-in-2012/#comments</comments>
		<pubDate>Tue, 05 Feb 2013 12:57:09 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[national vulnerability database]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerabilities 2012]]></category>
		<category><![CDATA[Vulnerable Operating Systems]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10279</guid>
		<description><![CDATA[Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s &#8230;]]></description>
				<content:encoded><![CDATA[<p>Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s ever-changing security landscape. Yet, in number terms, what are we looking at? What is the situation like? Has it improved or deteriorated? Are vendors fighting a losing battle? Read on for an in-depth look at some of the significant statistics on the vulnerabilities reported in 2012 (these results are compiled based on the data from the <a href="http://nvd.nist.gov/">National Vulnerability Database (NVD)</a>).</p>
<p>An alarming 4,347 new security vulnerabilities were reported in 2012, the highest number over the last three years. This means that last year nearly 12 new security vulnerabilities were discovered each day – when compared to the 3,532 vulnerabilities reported for 2011 (a rate of about 10 new vulnerabilities discovered every day).<span id="more-10279"></span></p>
<div id="attachment_10280" class="wp-caption aligncenter" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/number-of-vulnerabilities-2007-2012.jpg"><img class="size-medium wp-image-10280   " title="number of vulnerabilities 2007 - 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/number-of-vulnerabilities-2007-2012-300x97.jpg" width="300" height="97" /></a><p class="wp-caption-text"># of vulnerabilities 2007 &#8211; 2012 (Click to enlarge)</p></div>
<p>If we break down the number of vulnerabilities by severity there are fewer high severity vulnerabilities than there were in 2011. It is the number of medium and low severity vulnerabilities that has consistently increased.</p>
<p>Around 35% of the vulnerabilities discovered in 2012 were rated as having a high severity level. This percentage of high severity vulnerabilities, while still significant and considerably higher than vendors and customers would probably like, has been on the decrease for the last five years.</p>
<div id="attachment_10281" class="wp-caption aligncenter" style="width: 253px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/Vulnerability-distribution-by-severity-2012.jpg"><img class=" wp-image-10281   " title="Vulnerability distribution by severity - 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/Vulnerability-distribution-by-severity-2012-300x290.jpg" width="243" height="235" /></a><p class="wp-caption-text">Vulnerability distribution by severity &#8211; 2012 (Click to enlarge)</p></div>
<div id="attachment_10282" class="wp-caption aligncenter" style="width: 280px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/High-severity-vulnerabilities-2008-2012.jpg"><img class=" wp-image-10282  " title="High severity vulnerabilities 2008 - 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/High-severity-vulnerabilities-2008-2012-300x236.jpg" width="270" height="212" /></a><p class="wp-caption-text">High severity vulnerabilities 2008 &#8211; 2012 (Click to enlarge)</p></div>
<p>A total of 1107 vendors reported vulnerabilities in 2012, with the top 10 vendors reporting 41% of vulnerabilities. If we compare this figure to previous years, we can see that hackers and security researchers seem to be focusing on a larger number of vendors, and that the percentage of vulnerabilities found by the major vendors is gradually decreasing.</p>
<div id="attachment_10283" class="wp-caption aligncenter" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/Vulnerability-trends-for-top-vendors-2010-2012.jpg"><img class="size-medium wp-image-10283 " title="Vulnerability trends for top vendors 2010 - 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/Vulnerability-trends-for-top-vendors-2010-2012-300x170.jpg" width="300" height="170" /></a><p class="wp-caption-text">Vulnerability trends for top vendors 2010 &#8211; 2012 (Click to enlarge)</p></div>
<p>&nbsp;</p>
<p>Top 10 vendors by number of vulnerabilities reported in 2012:</p>
<div id="attachment_10284" class="wp-caption aligncenter" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/Top-10-vendors-by-number-of-vulnerabilities-2012-Click-to-enlarge.jpg"><img class="size-medium wp-image-10284 " title="Top 10 vendors by number of vulnerabilities - 2012 (Click to enlarge)" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/Top-10-vendors-by-number-of-vulnerabilities-2012-Click-to-enlarge-300x160.jpg" width="300" height="160" /></a><p class="wp-caption-text">Top 10 vendors by number of vulnerabilities &#8211; 2012 (Click to enlarge)</p></div>
<p>While the above list contains almost the same vendors as it did in 2011, some of the rankings have changed. Let&#8217;s look at a few details:</p>
<p>»      Oracle tops the chart with 424 vulnerabilities, much higher than their 262 entries in 2011. A significant number of these vulnerabilities are related to Java.</p>
<p>»      Apple has reported the most high severity vulnerabilities during 2012. Safari, iTunes and iOS generated most of them.</p>
<p>»      Microsoft continues to decrease the number of vulnerabilities it reported with 169 vulnerabilities, down from 244 in 2011 and 318 in 2010.</p>
<p>»      Google had the most vulnerabilities in 2011, but now lies in sixth position with only half of the vulnerabilities they reported in 2011.</p>
<p>86% of reported vulnerabilities come from third party applications, 10% from operating systems and 4% from hardware devices.</p>
<div class="wp-caption aligncenter" style="width: 250px"><a style="color: #ff4b33; line-height: 24px; font-size: 16px;" href="http://www.gfi.com/blog/wp-content/uploads/2013/02/Vulnerability-distribution-by-product-type-2012.jpg"><img class="wp-image-10285 " style="margin-top: 10px; margin-bottom: 10px; border: 0px solid black;" title="Vulnerability distribution by product type - 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/Vulnerability-distribution-by-product-type-2012-300x250.jpg" width="240" height="200" /></a><p class="wp-caption-text">Vulnerability distribution by product type &#8211; 2012 (Click to enlarge)</p></div>
<div></div>
<p>Cisco is by far the most targeted among hardware device vendors. For operating systems and third party applications more details are available below.</p>
<p>&nbsp;</p>
<h2>Most Targeted Operating Systems in 2012</h2>
<div id="attachment_10286" class="wp-caption aligncenter" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/Most-Targeted-Operating-Systems-in-2012.jpg"><img class="size-medium wp-image-10286 " title="Most Targeted Operating Systems in 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/Most-Targeted-Operating-Systems-in-2012-300x229.jpg" width="300" height="229" /></a><p class="wp-caption-text">Most Targeted Operating Systems in 2012 (Click to enlarge)</p></div>
<p>For the first time in several years Microsoft operating systems do not monopolize the top five positions. Windows operating systems still generate huge interest, but when compared with 2011 they have seen a drop of around half the vulnerabilities reported. They have now been surpassed by Apple iOS which saw 86 vulnerabilities &#8211; more than double the 35 entries reported in 2011. These numbers confirm that mobile platforms are garnering more and more attention from security researchers and hackers.</p>
<p>An interesting entry into the chart this year is VMware ESX/ESXi. The virtualization market is growing and the security focus has shifted to follow the trend.</p>
<p>&nbsp;</p>
<h2>Most Targeted Applications in 2012</h2>
<div id="attachment_10287" class="wp-caption aligncenter" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/Most-Targeted-Applications-in-2012.jpg"><img class="size-medium wp-image-10287 " title="Most Targeted Applications in 2012" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/Most-Targeted-Applications-in-2012-300x240.jpg" width="300" height="240" /></a><p class="wp-caption-text">Most Targeted Applications in 2012 (Click to enlarge)</p></div>
<p>The top targeted applications are, with a few minor changes, the same as in previous years. However, when compared against 2011 figures, RealNetworks RealPlayer and Microsoft Office no longer occupy the top slots. New entrants are ESR versions of Mozilla Firefox and Thunderbird, as well as FFmpeg. <a href="http://www.gfi.com/blog/the-most-vulnerable-operating-systems-and-applications-in-2011/">Click here</a> to view and compare with statistics from 2011.</p>
<p>&nbsp;</p>
<h2>Other interesting highlights are:</h2>
<p>»      Consistently, year after year, web browsers and their add-ons continue to generate the most interest.</p>
<p>»      454 vulnerabilities were reported in 2012 for the top five web browsers (Mozilla Firefox, Google Chrome, Apple Safari, Microsoft Internet Explorer and Opera Browser). This figure is greater than all the vulnerabilities reported in 2012 for all operating systems combined (which had “only” 436 vulnerabilities). However, it does represent a drop over 2011 when the top five browsers accumulated 515 vulnerabilities between them.</p>
<p>»      Mozilla Firefox had 159 vulnerabilities during 2012 making it &#8211; once again &#8211; the application with most vulnerabilities discovered for the year. The last time it held this ‘honor’ was in 2009, with Google Chrome occupying the top spot in 2010 and 2011 (and this year falling just behind Mozilla products).</p>
<p>»      To keep systems secure, it is critical to maintain them fully patched. It is important to dedicate extra attention and assign priority to:</p>
<ul>
<li>Operating systems</li>
<li>Web browsers</li>
<li>Adobe free products (Flash Player, Reader, Shockwave Player, AIR)</li>
<li>Java</li>
<li>Apple applications (iTunes and QuickTime)</li>
</ul>
<p>So how can you keep your systems secure and fully patched with little effort? Have a look at what <a href="http://www.gfi.com/pages/vulnerability-management.asp/?adv=13558&amp;loc=23">GFI LanGuard®</a> can do for your business today!</p>
<p style="text-align: left;">
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/report-the-most-vulnerable-operating-systems-and-applications-in-2012/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Security Patching Trends for Major Software Vendors</title>
		<link>http://www.gfi.com/blog/security-patching-trends-for-major-software-vendors/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=security-patching-trends-for-major-software-vendors</link>
		<comments>http://www.gfi.com/blog/security-patching-trends-for-major-software-vendors/#comments</comments>
		<pubDate>Tue, 13 Mar 2012 17:00:22 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mozilla]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[patch release cycles]]></category>
		<category><![CDATA[security patching]]></category>
		<category><![CDATA[Security Patching Trends]]></category>
		<category><![CDATA[Software Vendors]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8279</guid>
		<description><![CDATA[An important aspect of patch management and your patching schedule is to understand the patch release cycles adopted by the most important software vendors. In this post, we take a look at some statistics on this topic and how patch &#8230;]]></description>
				<content:encoded><![CDATA[<p>An important aspect of patch management and your patching schedule is to understand the patch release cycles adopted by the most important software vendors. In this post, we take a look at some statistics on this topic and how patch release cycles have changed over the last few years.</p>
<p>The big players in software industry are taking security seriously. They are becoming more efficient in fixing security issues and the results are evident. Six vendors: Microsoft, Adobe, Mozilla, Apple, Oracle and Google, together released 257 security bulletins/advisories fixing 1,521 vulnerabilities in 2011. In 2010, these vendors fixed 1,458 vulnerabilities.</p>
<p>Basically, a typical machine that is not patched will be exposed to between 30 to 50 new security vulnerabilities each month from the last time it was patched. More statistics about vulnerabilities discovered in 2011 are available <a href="http://www.gfi.com/blog/the-most-vulnerable-operating-systems-and-applications-in-2011/">here</a>.<span id="more-8279"></span><br />
<a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/number-of-security-bulletins-and-fixed-vulnerabilities.png"><img class="lightbox" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="number-of-security-bulletins-and-fixed-vulnerabilities" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/number-of-security-bulletins-and-fixed-vulnerabilities.png" alt="" width="482" height="576" /></a></p>
<h2>Microsoft</h2>
<p>Microsoft releases their security updates every second Tuesday of the month. The well-known release schedule for security updates helps users to plan their deployment accordingly. It is recommended that new patches are tested before they are applied in a production environment because some patches may cause issues in some cases, from preventing a service to start or crashing the system. Occasionally, when critical vulnerabilities are identified or if they were disclosed to public, Microsoft will release a fix out of the ordinary schedule.</p>
<p>100 security bulletins were released by Microsoft in 2011, addressing 240 vulnerabilities. These are fewer than the figure for 2010 when there were 106 security bulletins released, addressing 266 vulnerabilities. The number of critical security issues detected in Microsoft products is decreasing; however the number of security updates remains high due to non-critical security issues.</p>
<p>&nbsp;</p>
<h2>Adobe</h2>
<p>Adobe adopted the Microsoft model to release their security updates on “Patch Tuesdays”. This is because customers wanted a single patch cycle for both Adobe and Microsoft so that it would be easier for them to maintain their systems fully patched. Adobe products were a preferred target for hackers and security researchers over the past few years and numerous fixed were released as a result.</p>
<p>A total of 29 security bulletins were released by Adobe in 2011, addressing 197 vulnerabilities. This is one less bulletin than in 2010 when there were 30 security bulletins, addressing 202 vulnerabilities.</p>
<p>&nbsp;</p>
<h2>Mozilla</h2>
<p>Mozilla releases a new version of Firefox that includes the latest security fixes every six weeks. Occasionally they release updates containing security fixes out of the normal six-week cycle.</p>
<p>59 security bulletins were released by Mozilla in 2011, addressing 93 vulnerabilities &#8211; fewer than the 84 security bulletins released in 2010, addressing 102 vulnerabilities.</p>
<p>&nbsp;</p>
<h2>Apple</h2>
<p>Apple does not pre-announce or release their security updates on a regular schedule, thus making it difficult for companies to prepare for patch deployment in their environments. Apple’s software is also based on a large number of third party components that have their own vulnerabilities. For example, an update for Mac OS X will probably include fixes for Apache, MySQL, Java, OpenSSL, PHP, Python and so on. The problem with this is that there is a period of time that passes between the instance the vulnerability is fixed in the third-party component and the time when Apple updates the component in their system.</p>
<p>Apple do not provide a severity rating for their bulletins, but usually they contain a large number of fixes and must be all considered critical.</p>
<p>The number of security bulletins released by Apple has been pretty constant over the last few years &#8211; between 30 and 40 bulletins per year. 38 security bulletins were released by Apple in 2011, addressing an impressive number of 402 vulnerabilities. The same number of bulletins was released in 2010. Two years ago the number of vulnerabilities hit 468.</p>
<p>&nbsp;</p>
<h2>Oracle</h2>
<p>Oracle releases their security updates using two schedules. Java updates are released three times per year in February, June and October. All other products’ security updates are released once per quarter in January, April, July and October.</p>
<p>As the updates are concentrated in quarterly batches all security bulletins from Oracle include a large number of security fixes for a large number of Oracle products (except for the Java updates) and they are all rated critical.</p>
<p>Occasionally – one to two times a year – for some high impact vulnerabilities, Oracle does provide an out-of-band security fix.</p>
<p>334 vulnerabilities were fixed in the nine security bulletins provided by Oracle in 2011. This is more than the 273 vulnerabilities addressed in 2010.</p>
<p>&nbsp;</p>
<h2>Google</h2>
<p>Google releases security updates for Google Chrome all the time, even three times a month. Their release cycle is fast and the product is updated on a continuous basis. This is ok for home users that leave the product to automatically update itself, but for enterprises that want to test patches before applying them in a production environment it can be overwhelming: Google Chrome gets a larger number of security fixes, and twice as often, than all Microsoft products together. The number of vulnerabilities discovered in Google Chrome is also on the increase.</p>
<p>22 Google Chrome updates contained security fixes for 255 vulnerabilities in 2011. This is more than the 147 vulnerabilities addressed by security fixes in 2010.</p>
<p>&nbsp;</p>
<p><strong>Sources:</strong></p>
<p>Microsoft &#8211; <a href="http://technet.microsoft.com/en-us/security/bulletinarchive?y=2012&amp;m=1" target="_blank">http://technet.microsoft.com/en-us/security/bulletinarchive?y=2012&amp;m=1</a></p>
<p>Adobe &#8211; <a href="http://www.adobe.com/support/security/index.html" target="_blank">http://www.adobe.com/support/security/index.html</a></p>
<p>Mozilla &#8211; <a href="http://www.mozilla.org/security/announce/" target="_blank">http://www.mozilla.org/security/announce/</a></p>
<p>Oracle &#8211; <a href="http://www.oracle.com/technetwork/topics/security/alerts-086861.html?ssSourceSiteId=ocomen" target="_blank">http://www.oracle.com/technetwork/topics/security/alerts-086861.html?ssSourceSiteId=ocomen</a></p>
<p>Apple &#8211; <a href="http://support.apple.com/kb/HT1222" target="_blank">http://support.apple.com/kb/HT1222</a></p>
<p>Google - <a href="http://googlechromereleases.blogspot.com/search/label/Stable%20updates" target="_blank">http://googlechromereleases.blogspot.com/search/label/Stable%20updates<br />
</a></p>
<p>&nbsp;</p>
<p><em>Like our surveys and infographics? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/security-patching-trends-for-major-software-vendors/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Research: Web Browser War, Security Battle in 2011</title>
		<link>http://www.gfi.com/blog/research-web-browser-war-security-battle-in-2011/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=research-web-browser-war-security-battle-in-2011</link>
		<comments>http://www.gfi.com/blog/research-web-browser-war-security-battle-in-2011/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 15:00:59 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Apple Safari]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Mozilla Firefox]]></category>
		<category><![CDATA[national vulnerability database]]></category>
		<category><![CDATA[Opera Browser.]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[web browsers]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8216</guid>
		<description><![CDATA[No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, &#8230;]]></description>
				<content:encoded><![CDATA[<p>No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, as in 2010, web browsers had the higher number of security vulnerabilities reported compared to other applications. And these vulnerabilities can be used to target web servers, web applications and end-user machines, thus the considerable interest around them.</p>
<p>In 2011, the <a href="http://nvd.nist.gov/">National Vulnerability Database</a> reported that the top five browsers together had 515 vulnerabilities. This is more than the vulnerabilities reported for all operating systems together and on an ascending trend since 2010, when it was reported that together they had 472 vulnerabilities.<span id="more-8216"></span></p>
<p>However not all browsers have similar trends. Mozilla Firefox, Microsoft Internet Explorer and Apple Safari have less vulnerabilities compared to last year, while Google Chrome and Opera Browser have more. Below are more detailed statistics for each browser:<br />
<a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-browser-vulnerabilities.png"><img class="lightbox" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="web-browser-vulnerabilities" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-browser-vulnerabilities.png" alt="" width="515" height="617" /></p>
<p></a><strong>Google Chrome:</strong> Security vulnerabilities reported is on a highly ascending path. Google Chrome is the application with highest number of security vulnerabilities reported for the second year in a row. 275 new security vulnerabilities were discovered last year and the number is really impressive. For example, Microsoft “only” had 244 vulnerabilities reported in 2011 in all their products!</p>
<p><strong>Mozilla Firefox:</strong> Vulnerabilities reported is on a descending trend after it had a peak in 2009, when it was the application with highest number of vulnerabilities discovered for the year. 97 new security vulnerabilities were discovered last year. This is slightly lower than the 103 vulnerabilities reported in 2010.</p>
<p><strong>Internet Explorer:</strong> Security improvements added in latest versions contributed to the constantly descending number of discovered vulnerabilities in the browser for the past years. 45 new security vulnerabilities were discovered last year in Microsoft Internet Explorer. This is less than the 59 vulnerabilities reported in 2010.</p>
<p><strong>Apple Safari:</strong> After the peak it had in 2010, the number of vulnerabilities is lower in 2011. 45 new security vulnerabilities were discovered last year. This is good improvement compared with the 122 vulnerabilities reported in 2010.</p>
<p><strong>Opera Browser:</strong> The number of vulnerabilities reported in 2011 is on an ascending path, but the trend started from low levels and the number of critical vulnerabilities is still way below other browsers. 53 new security vulnerabilities were discovered last year. This is more than the 36 vulnerabilities reported in 2010.</p>
<p>96% of all vulnerabilities in web browsers were disclosed to public only after a fix was available from the vendor. This indicates that keeping your systems fully patched is crucial to reduce the risks of a security breach caused by a vulnerability in the web browser.</p>
<p>20 vulnerabilities out of the total of 515 either do not have a fix from vendor at all or it was released after the vulnerability was disclosed to public. These are what security specialists call zero-day vulnerabilities and are usually very dangerous because it is hard or impossible to protect against attacks exploiting vulnerabilities that have no fix available.</p>
<p><img class="lightbox" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="web-browser-zero-day-vulnerabilities-2011" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-browser-zero-day-vulnerabilities-2011.png" alt="" width="507" height="289" /></p>
<p>Public exploits for vulnerabilities reported in 2011 are available on the Internet for each web browser. Zero-day exploits are ones that were available on the Internet before a fix was available from vendor. Here is what I easily found out (a deeper research would have probably found out more):</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-browser-public-exploits-2011.png"><img class="lightbox" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="web-browser-public-exploits-2011" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-browser-public-exploits-2011.png" alt="" width="506" height="304" /></a></p>
<p>While there are some differences in the number of vulnerabilities and exploits for each browser the fact is that there is no such thing as a web browser that’s completely secure and therefore, patching them is one way to lower the risk of a security breach as much as possible.</p>
<p><em><br />
</em>Vulnerability and exploit sources used in this research:</p>
<p><a href="http://nvd.nist.gov/">http://nvd.nist.gov<br />
</a><a href="http://www.exploit-db.com/" target="_blank">http://www.exploit-db.com<br />
</a><a href="http://www.osvdb.org/" target="_blank">http://www.osvdb.org</a></p>
<p>&nbsp;</p>
<p style="text-align: center;">
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/research-web-browser-war-security-battle-in-2011/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>The Most Vulnerable Operating Systems and Applications in 2011</title>
		<link>http://www.gfi.com/blog/the-most-vulnerable-operating-systems-and-applications-in-2011/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-most-vulnerable-operating-systems-and-applications-in-2011</link>
		<comments>http://www.gfi.com/blog/the-most-vulnerable-operating-systems-and-applications-in-2011/#comments</comments>
		<pubDate>Mon, 27 Feb 2012 15:00:29 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[web browsers]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8221</guid>
		<description><![CDATA[As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I &#8230;]]></description>
				<content:encoded><![CDATA[<p>As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I collated for 2011.</p>
<p>To begin with, <a href="http://nvd.nist.gov/">National Vulnerability Database (NVD)</a> reports 3532 vulnerabilities in 2011. This means that last year about ten new security vulnerabilities were discovered each day. While the rate of newly discovered vulnerabilities is impressive, the good news is that the trend is on a descending path: 4258 vulnerabilities were reported in 2010 and the peak was in 2008, when almost 7000 vulnerabilities were reported.<span id="more-8221"></span></p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/number-of-vulnerabilities-2007-2011.png"><img class="lightbox" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="number-of-vulnerabilities-2007-2011" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/number-of-vulnerabilities-2007-2011.png" alt="number of vulnerabilities 2007-2011" width="479" height="130" /></a></p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/vulnerability-distribution-by-severiry-2011.png"><img class="lightbox alignright" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="vulnerability-distribution-by-severiry-2011" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/vulnerability-distribution-by-severiry-2011.png" alt="vulnerability distribution by severity - 2011" width="337" height="174" /></a>43% of vulnerabilities discovered in 2011 are rated as having HIGH severity level. The percentage of critical issues is considerable and remains pretty constant over the years. High severity vulnerabilities usually mean that they can be exploited remotely with high impact on the targeted machines. Luckily the majority of vulnerabilities have a fix available from the vendors by the time they are disclosed to public. It is extremely important, however, to keep your network fully patched.</p>
<p><span style="text-align: center;">Vulnerabilities were reported for 722 vendors, but top 10 vendors gather 50% of vulnerabilities:</span></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/vulnerability-table.png"><img class="lightbox aligncenter" style="border-image: initial; margin-top: 10px; margin-bottom: 10px; border-width: 0px; border-color: black; border-style: solid;" title="vulnerability-table" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/vulnerability-table.png" alt="vulnerability table" width="537" height="262" /></a></p>
<p>Microsoft continues to have the highest number of critical vulnerabilities, but the total number of Microsoft vulnerabilities in 2011 is down to 244 from 318 in 2010.</p>
<p>An interesting trend can be observed for Google that in 2011 has the highest number of vulnerabilities reported in NVD, going up to 299 vulnerabilities from 155 in 2010. The majority of them are in Google Chrome.</p>
<p>85% of reported vulnerabilities are in third party applications, 12% in operating systems and 3% in hardware devices.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/vulnerability-distribution-by-product-type-2011.png"><img class="lightbox alignleft" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="vulnerability-distribution-by-product-type-2011" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/vulnerability-distribution-by-product-type-2011.png" alt="" width="374" height="244" /></a>The number of vulnerabilities discovered in operating systems and hardware devices since 2008 has remained around the same levels (400-500 vulnerabilities in operating systems and 100-200 vulnerabilities per year in hardware devices). The situation is different for third party applications, where the number of vulnerabilities has constantly lowered since 2008: in 2011 are 3091 reported vulnerabilities as compared with 6378 in 2008. Practically in 2011 were discovered 50% less vulnerabilities in third party applications than they were discovered in 2008.</p>
<h2>Most Targeted Operating Systems in 2011</h2>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/OS-table.png"><img class="lightbox aligncenter" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="OS-table" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/OS-table.png" alt="OS Table" width="539" height="414" /></a></p>
<p>Microsoft operating systems are by far the most targeted, followed by Cisco IOS and Apple Mac OS X.</p>
<p>Google Android made its entry in the top this year. It will be interesting to observe its evolution in the next year as the number of Android smart phones and tablets increases at fast rate and it is expected to generate more and more interest from security researchers and hackers. The same applies for Apple iOS, which already has a good number of vulnerabilities.</p>
<h2>Most Targeted Applications in 2011<span style="text-align: center;"> </span></h2>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/Application-table.png"><img class="lightbox aligncenter" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="Application-table" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/Application-table.png" alt="Application Table" width="538" height="426" /></a></p>
<p>The applications that have higher number of vulnerabilities reported in 2011 are – with small changes – the same as in 2010. Here are some highlights:</p>
<ul>
<li>Web browsers and their add-ins continue to generate the most interest.</li>
<li>Along with the operating systems and web browsers it is mandatory to monitor and make sure they are always full patched: Adobe products (Flash Player, Reader, Shockwave Player, AIR), Java, Microsoft Office and other popular and largely spread applications like Apple iTunes, Apple QuickTime and RealPlayer</li>
<li>Google Chrome remains, as in 2010, the application with the largest number of vulnerabilities reported in NVD. More than that, the number of vulnerabilities reported in 2011 almost doubled compared to 2010, from 152 to 275.</li>
<li>Apple iTunes had an impressive increment of vulnerabilities discovered in 2011 as compared to 2010, from 8 to 78.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-most-vulnerable-operating-systems-and-applications-in-2011/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Can Companies Defend Against Targeted Attacks? (Part 2)</title>
		<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=companies-defend-targeted-attacks-part-2</link>
		<comments>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-2/#comments</comments>
		<pubDate>Tue, 01 Mar 2011 18:41:25 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security attacks]]></category>
		<category><![CDATA[security threats]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3155</guid>
		<description><![CDATA[In the previous post I wrote about the interesting questions raised due to the hacking of IT security firm HBGary. What should we learn from this incident? So, going back to HBGary &#8211; why were they apparently so easy to &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="barbed wire" href="http://www.gfi.com/blog/wp-content/uploads/2011/02/barbed-wire.jpg"><img class="alignright size-medium wp-image-3152" style="margin: 10px; border: 0px solid black;" title="barbed wire" src="http://www.gfi.com/blog/wp-content/uploads/2011/02/barbed-wire-300x225.jpg" alt="" width="300" height="225" /></a>In the previous post I wrote about <a href="http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/" target="_blank">the interesting questions raised due to the hacking of IT security firm HBGary</a>. What should we learn from this incident?</p>
<p>So, going back to HBGary &#8211; why were they apparently so easy to hack?</p>
<p>It is not because they have no clue about security, but rather because they underestimated the risks. When:</p>
<ul>
<li>you are a IT security company</li>
<li>your customers are governmental institutions or huge enterprises that are very sensitive to bad press</li>
<li>you start a war with hackers</li>
</ul>
<p>… you need to drastically raise your security level.</p>
<p>Ok, but how high?</p>
<p><span id="more-3155"></span>If they would have not been vulnerable to that SQL injection, and used only highly secure passwords and had their systems fully patched, would that have been enough? The answer is yes for most companies, but probably not for HBGary.</p>
<p>Why is that? Because (judging by their actions) the Anonymous seemed to have had both the desire and the resources to raise the bar to a much higher level too. Probably it would have been harder for them, but when they were able to combine social engineering with SQL injection, with password cracking and exploits of missing security updates, I don’t see any reason why they would not have been capable of subtle social engineering or detection and usage of 0-day exploits.</p>
<p>A lot of companies would not be able to successfully defend against such an attack, but the truth is that the risk of facing such aggressive actions is minimal for the large majority of companies.</p>
<p>HBGary got in trouble because they started a war with an enemy that proved to be much stronger than they thought. But what are the chances for an average company to be targeted?  A common mistake that leads to the underestimation of risks is to think that you are too small or too unimportant to get attention and become a target. Again, the key is the balance between security enforcement and the potential damage a security breach will cause.</p>
<p>Of course, companies like Amazon or Apple have much more valuable data than a small local shop. But they also have more powerful security systems. Breaking them is extremely difficult, requires a lot of resources and the risk of being caught is high. If the security of the local shop is almost nonexistent, then it is probably a more attractive target than these big companies are. This is because hackers will get decent earnings with low efforts and low risks. If the local shop raises their security a bit higher, it will probably reach the point where hackers decide it is not profitable for them to waste time and resources to attack it.</p>
<p>What are the critical points to consider when building your defense?</p>
<p>You are as secure are your weakest point, so it is crucial to concentrate on all aspects of security:</p>
<ul>
<li>Restrict physical access</li>
</ul>
<ul>
<li>Build the security software infrastructure</li>
</ul>
<ul>
<li>Create and enforce security policies</li>
</ul>
<ul>
<li>Train your people on how to apply these policies and how to avoid being tricked through social engineering.</li>
</ul>
<p>People are an important part of the equation and probably the most difficult to deal with. Even if your security policies are ok, and they are correctly applied by all employees, it is virtually impossible to know and control what happens when your employees are at home. Nobody can stop them from publishing data on social networks which could compromise your security; nobody stops people from reusing the super secure passwords they use at work on a dubious site that can be very easy to hack.</p>
<p>To maximize correct usage and acceptance of security policies people need to clearly understand why the policies are necessary and policies need to be designed to interfere minimally with the normal working flow. Keeping the <a href="http://www.gfi.com/blog/security-usability-finding-balance/">balance between security and usability</a> is very important. Unnatural, hard to apply security policies are among the worst things that can happen to a company from a security point of view. This is because they are giving a false sense of security, while in reality people will find ways to bypass them.</p>
<p>Companies want their employees to use secure passwords, but very few of them are teaching people techniques to generate secure passwords that are easy to remember. So they may end up having an environment vulnerable to social engineering simply because administrators are used to and will not react when they are asked for dubious password resets.</p>
<p>Other risks that are hard to foresee and control are the vulnerabilities from the applications used in the business environment. The most secure approach around this is to isolate the computers from the rest of the world by restricting online access; however, this is not always possible. To mitigate the risks you need to be selective on what applications are allowed in the business environment and make sure they are fully patched.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-2/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Can Companies Defend Against Targeted Attacks? (Part 1)</title>
		<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=companies-defend-targeted-attacks-part-1</link>
		<comments>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/#comments</comments>
		<pubDate>Thu, 24 Feb 2011 16:10:36 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security attacks]]></category>
		<category><![CDATA[security threats]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3151</guid>
		<description><![CDATA[The story with all the interesting details about how security company HBGary was hacked earlier this month, published by Ars Technica last week, has made quite some noise with people concerned about IT security. It is a perfect – by &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="barbed wire" href="http://www.gfi.com/blog/wp-content/uploads/2011/02/barbed-wire.jpg"><img class="alignright size-medium wp-image-3152" style="margin: 10px; border: 0px solid black;" title="barbed wire" src="http://www.gfi.com/blog/wp-content/uploads/2011/02/barbed-wire-300x225.jpg" alt="" width="300" height="225" /></a>The story with all the interesting details about how security company HBGary was hacked earlier this month, published by <a href="http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/">Ars Technica</a> last week, has made quite some noise with people concerned about IT security. It is a perfect – by the book – example of how to find and use weaknesses in a security system to bypass it.</p>
<p><span id="more-3151"></span>In short, what happened is the following: the CEO of HBGary Federal wanted to increase publicity around his company by exposing the real identities of the leaders of a well known group of hackers called Anonymous. For this he infiltrated into their IRC chat rooms and researched profiles from social networks like Facebook, LinkedIn or Twitter. When he thought that he found what he was looking for, he started to make noise about his achievement by publishing articles on newspapers, setting meetings with FBI and revealing his true identity to the Anonymous. This made the group of hackers very angry and their response was devastating for HBGary, which had its servers broken, email messages published on the Internet and websites hacked. Additionally, the results of the research that generated all this trouble were revealed as not reliable.</p>
<p>The next, equally bad or even more disastrous, hit for HBGary were the details from the story presented by Ars Technica. Anonymous revealed how they managed to bypass their security. And what is shocking is how easy it seems to be to penetrate the security of the company that is, after all, an expert in security.</p>
<p>The story raises a lot of questions:</p>
<ul>
<li>Why was their security so weak? Aren’t security companies supposed to know how to defend against these types of attacks?</li>
<li>Would have better security really saved them? Or would the attackers have adapted and used more ingenious ways to get in?</li>
<li>How likely is this to happen to a small or medium-sized company? While you can imagine it happening to big players like Microsoft or Google, can it happen to small companies that did not upset the “wrong guys”?</li>
<li>How prepared are companies for targeted attacks?  How many of them would remain standing after such an assault?</li>
</ul>
<p>An important thing to mention is that the standard suite of security software (firewall, antivirus, antispyware, anti-spam, anti-phishing, patch management, etc.) does a decent job to stop 99% of the attacks: non targeted ones – the pieces of malware that are randomly scanning the Internet for vulnerable machines and infecting them, the emails with malicious attachments or those pointing to dangerous sites, the sites that simulate well known services to trick you and get your passwords, etc. They are indispensable for targeted attacks too, but here things are much more complex and they are far from being enough.</p>
<p>What can be done to ensure well enough security? (Well enough is the maximum you can get, there is no such thing as a perfect security system.)</p>
<p>It is extremely important to keep the security system defenses aligned with the potential damages that a security breach will cause.</p>
<p>For a small startup that is still in its early stages with just a few computers it usually makes no sense to invest massively in security. This is not only because the costs will kill the business faster than any hacker, but also because the company simply doesn’t have enough valuable assets to make the effort worthwhile. However as the company starts to have a history, they also start to have more and more sensitive data: financial data, customers’ and partners’ data, development strategies, etc. Now it becomes more dangerous to lose data or to have confidential data stolen.</p>
<p>The key is to keep the balance between security enforcement and the risks that usually increase over time, and this is the point where a lot of companies fail. Some common reasons for this are:</p>
<ul>
<li>The company is not aware of the risks simply because they don’t have the necessary expertise to evaluate them.</li>
</ul>
<ul>
<li>The risks are underestimated. In this case the security enforcement is seen as an unnecessary cost.</li>
</ul>
<ul>
<li>The company is aware of the risks and their efforts in the area give them a false sense of security, while they actually have a problem in applying policies.</li>
</ul>
<p>Usually a security incident is what makes these companies realize where they really stand.</p>
<p>In the second part of this series I’ll talk about <a href="http://www.gfi.com/blog/companies-defend-targeted-attacks-part-2/" target="_blank">what happened to HBGary and what we should learn from it</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Top Most Vulnerable Applications and Operating Systems in 2010</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-vulnerable-applications-operating-systems-2010</link>
		<comments>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/#comments</comments>
		<pubDate>Thu, 17 Feb 2011 11:33:51 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[IE vulnerability]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security patches]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[Vulnerable Applications]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130</guid>
		<description><![CDATA[Analyzing the data on 2010 from National Vulnerability Database reveals some interesting statistics. This is the list of the top most targeted applications in 2010: As more and more businesses and applications are moving to the web, browsers are the &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="data analysis" href="http://www.gfi.com/blog/wp-content/uploads/2011/02/data-analysis.jpg"><img class="alignright size-medium wp-image-3135" title="data analysis" src="http://www.gfi.com/blog/wp-content/uploads/2011/02/data-analysis-300x199.jpg" alt="" width="240" height="159" /></a>Analyzing the data on 2010 from <a href="http://nvd.nist.gov/" target="_blank">National Vulnerability Database</a> reveals some interesting statistics.</p>
<p><span id="more-3130"></span>This is the list of the top most targeted applications in 2010:</p>
<p style="text-align: center;"><a class="lightbox" title="Table 1" href="http://www.gfi.com/blog/wp-content/uploads/2011/02/Table-1.jpg"><img class="aligncenter size-full wp-image-3131" title="Table 1" src="http://www.gfi.com/blog/wp-content/uploads/2011/02/Table-1.jpg" alt="" width="541" height="308" /></a></p>
<p>As more and more businesses and applications are moving to the web, browsers are the favorite targets for hackers and security researchers. These are followed closely by Adobe tools, Microsoft Office, RealPlayer and Java Runtime Environment.</p>
<p>The top most targeted operating systems in 2010 are the following:</p>
<p style="text-align: center;"><a class="lightbox" title="Table 2" href="http://www.gfi.com/blog/wp-content/uploads/2011/02/Table-2.jpg"><img class="aligncenter size-full wp-image-3132" title="Table 2" src="http://www.gfi.com/blog/wp-content/uploads/2011/02/Table-2.jpg" alt="" width="542" height="230" /></a></p>
<p>Microsoft still remains the preferred target when talking about operating systems, followed very far behind by Linux, Apple Mac OS X and Cisco IOS.</p>
<p><a class="lightbox" title="Pie Chart" href="http://www.gfi.com/blog/wp-content/uploads/2011/02/Pie-Chart.jpg"><img class="aligncenter size-full wp-image-3133" title="Pie Chart" src="http://www.gfi.com/blog/wp-content/uploads/2011/02/Pie-Chart.jpg" alt="" width="391" height="255" /></a></p>
<p>From the data above we can see that 75% of vulnerabilities are targeting applications, 18% operating systems and 7% hardware devices (i.e. Cisco). This means that patching only Microsoft products is not enough. Adobe products, web browsers and Java Runtime Environment are the minimum set of other applications that must be monitored closely to ensure they are always fully patched for adequate security.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/feed/</wfw:commentRss>
		<slash:comments>14</slash:comments>
		</item>
		<item>
		<title>Patching Season?</title>
		<link>http://www.gfi.com/blog/patching-season/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=patching-season</link>
		<comments>http://www.gfi.com/blog/patching-season/#comments</comments>
		<pubDate>Thu, 16 Dec 2010 12:46:55 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Headline]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Microsoft Exchange]]></category>
		<category><![CDATA[Microsoft Office]]></category>
		<category><![CDATA[Microsoft SharePoint]]></category>
		<category><![CDATA[Microsoft Windows]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3086</guid>
		<description><![CDATA[The holidays are coming with a large number of security updates releases from vendors. So far this month we already have the following important updates: Google Chrome version 8.0.552.215 was released on 2nd December with 13 security fixes, 4 of &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="patching" href="http://www.gfi.com/blog/wp-content/uploads/2010/12/patching.jpg"><img class="alignright size-medium wp-image-3087" style="margin: 10px;" title="patching" src="http://www.gfi.com/blog/wp-content/uploads/2010/12/patching-300x200.jpg" alt="" width="300" height="200" /></a>The holidays are coming with a large number of security updates releases from vendors.</p>
<p>So far this month we already have the following important updates:</p>
<ul>
<li><a href="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">Google Chrome version 8.0.552.215</a> was released on 2<sup>nd</sup> December with 13 security fixes, 4 of them high severity level</li>
<li><a href="http://support.apple.com/kb/HT4447">Apple QuickTime version 7.6.9</a> is available from 7<sup>th</sup> December. It contains 15 security fixes, 14 of them labeled as critical.</li>
<li>Mozilla has released yesterday <a href="http://www.mozillamessaging.com/en-US/thunderbird/3.1.7/releasenotes/">Thunderbird versions 3.0.11/3.1.7</a> addressing 3 critical security issues and <a href="http://www.mozilla.com/en-US/firefox/3.6.13/releasenotes/">Firefox 3.5.16/3.6.13</a> with 11 security fixes, out of which 10 are critical or high severity level.</li>
</ul>
<p><span id="more-3086"></span></p>
<p>Oracle has released <a href="http://www.oracle.com/technetwork/java/javase/6u23releasenotes-191058.html">Java 6 update 23</a>, but this is a non security update.</p>
<p>This week we had the biggest Microsoft patch Tuesday ever. 17 new security bulleting were released, 16 of them labeled as critical or important. This is an all time record from Microsoft. The following Microsoft products are affected:</p>
<ul>
<li>Microsoft Windows</li>
<li>Internet Explorer</li>
<li>Microsoft Office</li>
<li>Microsoft SharePoint</li>
<li>Microsoft Exchange</li>
</ul>
<p>More details are available <a href="http://www.microsoft.com/technet/security/bulletin/ms10-dec.mspx">here</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/patching-season/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>5 Benefits of Automating Patch Management</title>
		<link>http://www.gfi.com/blog/5-benefits-automating-patch-management/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-benefits-automating-patch-management</link>
		<comments>http://www.gfi.com/blog/5-benefits-automating-patch-management/#comments</comments>
		<pubDate>Thu, 25 Nov 2010 15:18:21 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3037</guid>
		<description><![CDATA[In a previous article I wrote about software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks. You need a patch management solution for proper patch management. But what are &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="patch management 2" href="http://www.gfi.com/blog/wp-content/uploads/2010/11/patch-management-2.jpg"><img class="alignright size-medium wp-image-3038" style="margin: 10px;" title="patch management 2" src="http://www.gfi.com/blog/wp-content/uploads/2010/11/patch-management-2-300x200.jpg" alt="" width="300" height="200" /></a>In a previous article I wrote about <a href="http://www.gfi.com/blog/automate-patching-party-applications-gfi-languard/" target="_blank">software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks</a>.</p>
<p>You need a patch management solution for proper patch management. But what are the benefits of automating patch management for these companies?</p>
<p><span id="more-3037"></span></p>
<ul>
<h2>1. Security</h2>
</ul>
<p>Security is the most obvious reason as to why companies would want to have an automated patch management solution in place. One of the main reasons why software vendors release new patches is to fix security vulnerabilities that can be exploited by malicious software or people intending to damage the IT systems or network.</p>
<p>Applying security patches in a timely fashion highly reduces the risk of having a security breach and all the related problems that come with it, like data theft, data loss, reputations issues or even legal penalties.</p>
<ul>
<h2>2. Company Productivity</h2>
</ul>
<p>An efficient system which deploys patches network wide helps to improve the productivity of the company in many ways. Often patches come with performance improvements for the products they apply to, or fix crashes. Helping employees get rid of these issues will lead to a productivity boost. The improved security also helps productivity. In the majority of cases the worst effect of malware is not the stealing of company sensitive data, but rather the downtime that badly affects productivity. The effect varies from congested networks or slowed down systems because of malware activity, to breakdowns of business critical applications and to systems which are totally compromised and need to be reinstalled from scratch.</p>
<ul>
<h2>3. IT Department Productivity</h2>
</ul>
<p>Productivity gain is easily measured within the IT department. You just need to ascertain how many people and working hours are required to patch the systems manually, and how much you save by using software that automates the process. In fact, for companies that have more than 20-25 computers in their network, the headaches and time required to perform manual patching are so high that, if the company does not have a solution to automate patch management, they probably do not do it at all or it is limited to critical servers only.</p>
<ul>
<h2>4. Compliancy</h2>
</ul>
<p>Recently compliancy has become an important driver for companies to implement a patch management solution. There are more and more laws and regulations that are imposing security best practices on companies and having the systems fully patched is one of the most important security rules.</p>
<p>Government institutions, companies offering financial services and healthcare organizations are among the most affected by these regulations, but the trend is that all companies will need to be secure enough to be able to protect the privacy and data of their employees, customer and partners.</p>
<p>Here is a list with some of the most important standards related to IT infrastructure security: Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), Sarbanes–Oxley Act (SOX), Gramm–Leach–Bliley Act (GLB/GLBA), Federal Information Security Management Act (FISMA), Family Educational Rights and Privacy Act (FERPA), Government Connect Secure Extranet &#8211; Code of Connection (GCSx CoCo).</p>
<p>Failure to comply can result in losing opportunities, incurring legal and financial penalties or even losing your business.</p>
<ul>
<h2>5. Keep Up with New Features</h2>
</ul>
<p>Patches can contain new features, adding new functionality or extending support for additional platforms. For organizations this often translates into opportunities to improve or extend their services.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-benefits-automating-patch-management/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Top 15 Most Vulnerable Applications</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-15-vulnerable-applications</link>
		<comments>http://www.gfi.com/blog/top-15-vulnerable-applications/#comments</comments>
		<pubDate>Wed, 28 Jul 2010 11:40:30 +0000</pubDate>
		<dc:creator>Cristian Florian</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security vulnerabilities]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784</guid>
		<description><![CDATA[Top 15 Most Vulnerable Applications Which were the most vulnerable applications in the first half of 2010? Below are the results after processing vulnerability data feeds as of July 7, 2010 from National Vulnerability Database (NVD), which is the U.S. &#8230;]]></description>
				<content:encoded><![CDATA[<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Top 15 Most Vulnerable Applications</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Which were the most vulnerable applications in the first half of 2010?</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Below are the results after processing vulnerability data feeds as of July 7, 2010 from National Vulnerability Database (NVD), which is the U.S. government repository of standards based vulnerability management data:</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">Interesting highlights and remarks:</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">-<span style="white-space: pre;"> </span>Web browsers are the most targeted applications. They hold the top four places. Other popular targets for hackers are Adobe products, Java Runtime Environment and Microsoft Office.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">-<span style="white-space: pre;"> </span>Discussions about which browser is most secure do not make much sense. They all have quite a number of new security vulnerabilities. Probably a safe web browser is one which is used by only a few people and therefore is not popular enough to get attention from hackers. However, on such a browser a lot of sites will not work simply because most developers only test their site on the top most used browsers.</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">-<span style="white-space: pre;"> </span>Adobe, Microsoft and Mozilla have the most products in the top 15:</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">o<span style="white-space: pre;"> </span>Adobe – 5 products</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">o<span style="white-space: pre;"> </span>Microsoft – 3 products</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">o<span style="white-space: pre;"> </span>Mozilla – 3 products</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">o<span style="white-space: pre;"> </span>Oracle – 2 products</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">o<span style="white-space: pre;"> </span>Apple – 1 product</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">o<span style="white-space: pre;"> </span>Google – 1 product</div>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">According to NVD new security vulnerabilities are published with a rate of 16 per day. Vendors are forced to release a lot of security updates to keep their products secure; therefore a vulnerability management tool like GFI LANguard can be very helpful. Currently LANguard can automate patching for 11 products out of the 15 mentioned above. Here is the full list of supported non-Microsoft products.</div>
<p>Which were the most vulnerable applications in the first half of 2010?</p>
<p>Below are the results after processing vulnerability data feeds as of July 7, 2010 from National Vulnerability Database (NVD), which is the U.S. government repository of standards based vulnerability management data:</p>
<p style="text-align: center;"><a class="lightbox" title="Table" href="http://www.gfi.com/blog/wp-content/uploads/2010/07/Table1.jpg"><img class="size-full wp-image-2786 aligncenter" style="margin-top: 10px; margin-bottom: 10px;" title="Table" src="http://www.gfi.com/blog/wp-content/uploads/2010/07/Table1.jpg" alt="" width="471" height="400" /></a><span id="more-2784"></span></p>
<p>Interesting highlights and remarks:</p>
<ul>
<li>Web browsers are the most targeted applications. They hold the top four places. Other popular targets for hackers are Adobe products, Java Runtime Environment and Microsoft Office.</li>
<li>Discussions about which browser is most secure do not make much sense. They all have quite a number of new security vulnerabilities. Probably a safe web browser is one which is used by only a few people and therefore is not popular enough to get attention from hackers. However, on such a browser a lot of sites will not work simply because most developers only test their site on the top most used browsers.</li>
<li>Adobe, Microsoft and Mozilla have the most products in the top 15:<br />
o<span style="white-space: pre;"> </span>Adobe – 5 products<br />
o<span style="white-space: pre;"> </span>Microsoft – 3 products<br />
o<span style="white-space: pre;"> </span>Mozilla – 3 products<br />
o<span style="white-space: pre;"> </span>Oracle – 2 products<br />
o<span style="white-space: pre;"> </span>Apple – 1 product<br />
o<span style="white-space: pre;"> </span>Google – 1 product</li>
</ul>
<p>According to NVD new security vulnerabilities are published with a rate of 16 per day. Vendors are forced to <a href="http://www.gfi.com/blog/gfi-languard-adds-applications-patch-management-list" target="_blank">release a lot of security updates</a> to keep their products secure; therefore a vulnerability management tool like GFI LANguard can be very helpful. Currently LANguard can automate patching for 11 products out of the 15 mentioned above. Here is the full list of supported non-Microsoft products.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-15-vulnerable-applications/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 10:27:21 by W3 Total Cache --