<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Top 15 Most Vulnerable Applications</title>
	<atom:link href="http://www.gfi.com/blog/top-15-vulnerable-applications/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/top-15-vulnerable-applications/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-15-vulnerable-applications</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Adrian</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-9023</link>
		<dc:creator>Adrian</dc:creator>
		<pubDate>Thu, 12 Aug 2010 08:41:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-9023</guid>
		<description><![CDATA[I’m now left wondering if the drop in IE security concerns is due to a lot of users migrating to other browsers.  It may not be that IE is increasing it’s security, but rather, other browsers are being exploited more. 

I know that there’s a direct correlation between the size of a program’s user base to the amount of security exploits; but what I didn’t figure was that the correlation would be this influential on the actual numbers.]]></description>
		<content:encoded><![CDATA[<p>I’m now left wondering if the drop in IE security concerns is due to a lot of users migrating to other browsers.  It may not be that IE is increasing it’s security, but rather, other browsers are being exploited more. </p>
<p>I know that there’s a direct correlation between the size of a program’s user base to the amount of security exploits; but what I didn’t figure was that the correlation would be this influential on the actual numbers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Declan Good</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8964</link>
		<dc:creator>Declan Good</dc:creator>
		<pubDate>Wed, 11 Aug 2010 04:13:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8964</guid>
		<description><![CDATA[I have to agree with a lot of the sentiments here. I was utterly surprised that Apple’s Safari took the top spot which I thought would’ve been a shoe-in for Microsoft’s Internet Explorer. It’s no surprise that browsers are high up in the list, but with Google’s Chrome being a recent addition, I’m still shocked that it surpassed IE so quickly.  I think it’s about time I re-evaluated the browsers being used in the office now.]]></description>
		<content:encoded><![CDATA[<p>I have to agree with a lot of the sentiments here. I was utterly surprised that Apple’s Safari took the top spot which I thought would’ve been a shoe-in for Microsoft’s Internet Explorer. It’s no surprise that browsers are high up in the list, but with Google’s Chrome being a recent addition, I’m still shocked that it surpassed IE so quickly.  I think it’s about time I re-evaluated the browsers being used in the office now.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ken Ballweg</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8693</link>
		<dc:creator>Ken Ballweg</dc:creator>
		<pubDate>Tue, 03 Aug 2010 15:15:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8693</guid>
		<description><![CDATA[Wish such articles would clarify &quot;vulnerability&quot; from &quot;exploit&quot;. Apple has the more vulnerabilities, I suspect, because they are used to security through obscurity, which is actually starting to change in the black hat community. There is a certain arrogance to their patching patterns based on the fact that surprisingly few exploits have targeted Mac OS installations. Apple is somewhat notorious for having long cycles between being alerted to vulnerabilities and actually issuing security updates. Something which will eventually bite them big time I suspect. 

There are far fewer exploits written against the newer revs of browsers simply because the economy of scale has the majority of black hats going after the best bang for the buck which means they will concentrate on the most installed applications, and focus on known code bases. 

It&#039;s also hard to know what to think of a single lumping of &quot;Internet Explorer&quot; since the IE8 code base is very different from IE7, and both are very different from IE6 which is generally regarded as the champ for successful exploits among browsers. For that matter, lumping Safari as if it was a single application code base is equally misleading. Safari for OSX vs. Safari for Win are different beasts entirely, and I personally wont allow Safari for Win on the system I administer because of it&#039;s history of being poorly written (and Apple&#039;s lax patching history) more than concerns for risk. 

While this is useful information it addresses too few variables to be useful in determining which apps are the most exploitable.]]></description>
		<content:encoded><![CDATA[<p>Wish such articles would clarify &#8220;vulnerability&#8221; from &#8220;exploit&#8221;. Apple has the more vulnerabilities, I suspect, because they are used to security through obscurity, which is actually starting to change in the black hat community. There is a certain arrogance to their patching patterns based on the fact that surprisingly few exploits have targeted Mac OS installations. Apple is somewhat notorious for having long cycles between being alerted to vulnerabilities and actually issuing security updates. Something which will eventually bite them big time I suspect. </p>
<p>There are far fewer exploits written against the newer revs of browsers simply because the economy of scale has the majority of black hats going after the best bang for the buck which means they will concentrate on the most installed applications, and focus on known code bases. </p>
<p>It&#8217;s also hard to know what to think of a single lumping of &#8220;Internet Explorer&#8221; since the IE8 code base is very different from IE7, and both are very different from IE6 which is generally regarded as the champ for successful exploits among browsers. For that matter, lumping Safari as if it was a single application code base is equally misleading. Safari for OSX vs. Safari for Win are different beasts entirely, and I personally wont allow Safari for Win on the system I administer because of it&#8217;s history of being poorly written (and Apple&#8217;s lax patching history) more than concerns for risk. </p>
<p>While this is useful information it addresses too few variables to be useful in determining which apps are the most exploitable.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cristian Florian</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8644</link>
		<dc:creator>Cristian Florian</dc:creator>
		<pubDate>Mon, 02 Aug 2010 11:48:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8644</guid>
		<description><![CDATA[@ Hansel

I assume Safari has recently become attractive for attackers because of the success of iPhone and iPad.]]></description>
		<content:encoded><![CDATA[<p>@ Hansel</p>
<p>I assume Safari has recently become attractive for attackers because of the success of iPhone and iPad.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Hansel</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8543</link>
		<dc:creator>Hansel</dc:creator>
		<pubDate>Fri, 30 Jul 2010 20:16:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8543</guid>
		<description><![CDATA[Sue, I am just as surprised as you. Safari at the top spot and IE last among the major browsers. You would have thought someone made a mistake and got the data wrong. It also doesn&#039;t seem to follow since one would assume that among these browsers, Safari would have the least users (http://en.wikipedia.org/wiki/Usage_share_of_web_browsers) Now why would an attacker give the time of the day to attack a browser that&#039;s least used? Interesting indeed.]]></description>
		<content:encoded><![CDATA[<p>Sue, I am just as surprised as you. Safari at the top spot and IE last among the major browsers. You would have thought someone made a mistake and got the data wrong. It also doesn&#8217;t seem to follow since one would assume that among these browsers, Safari would have the least users (<a href="http://en.wikipedia.org/wiki/Usage_share_of_web_browsers" rel="nofollow">http://en.wikipedia.org/wiki/Usage_share_of_web_browsers</a>) Now why would an attacker give the time of the day to attack a browser that&#8217;s least used? Interesting indeed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cristian Florian</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8529</link>
		<dc:creator>Cristian Florian</dc:creator>
		<pubDate>Fri, 30 Jul 2010 16:11:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8529</guid>
		<description><![CDATA[@ Robert Okadar and Micke 

As I stated in the article I think that all important browsers are vulnerable to an extent and that makes discussions on which is the most secure/less vulnerable quite irrelevant.

Indeed numbers of vulnerabilities do not cover all security aspects of a product, but they do offer important information. They indicate which products are the preferred targets for hackers and malware. They show network administrators which applications need more attention and must be considered as high priority for patch management.

Regarding the time that vendors need to fix vulnerabilities - as you correctly say, this is an important metric when talking about product security. However, equally or even more important is the time taken for users to apply the patches made available by the vendor. From this perspective it is easier to manage patches that are released on a regular schedule as Microsoft does.  This tends to leave companies with less time between deploying Microsoft updates than the time needed to deploy updates for other vendors like Mozilla or Adobe.]]></description>
		<content:encoded><![CDATA[<p>@ Robert Okadar and Micke </p>
<p>As I stated in the article I think that all important browsers are vulnerable to an extent and that makes discussions on which is the most secure/less vulnerable quite irrelevant.</p>
<p>Indeed numbers of vulnerabilities do not cover all security aspects of a product, but they do offer important information. They indicate which products are the preferred targets for hackers and malware. They show network administrators which applications need more attention and must be considered as high priority for patch management.</p>
<p>Regarding the time that vendors need to fix vulnerabilities &#8211; as you correctly say, this is an important metric when talking about product security. However, equally or even more important is the time taken for users to apply the patches made available by the vendor. From this perspective it is easier to manage patches that are released on a regular schedule as Microsoft does.  This tends to leave companies with less time between deploying Microsoft updates than the time needed to deploy updates for other vendors like Mozilla or Adobe.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cristian Florian</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8507</link>
		<dc:creator>Cristian Florian</dc:creator>
		<pubDate>Fri, 30 Jul 2010 08:30:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8507</guid>
		<description><![CDATA[When Internet Explorer was the absolute king of web browsers, it was the natural choice to look for security weaknesses.

Now the increased usage of Firefox and high media attention that Apple gets lately made them high priority targets for hackers and malware, while Internet Explorer 8 has made important progress from a security point of view when compared with previous versions.

Anyway all important browsers have plenty of vulnerabilities. It is hard to say which one is more secure. What is certain – and it can be noticed from the number of vulnerabilities – is that Safari, Firefox and Chrome got important enough to be attractive for hackers.]]></description>
		<content:encoded><![CDATA[<p>When Internet Explorer was the absolute king of web browsers, it was the natural choice to look for security weaknesses.</p>
<p>Now the increased usage of Firefox and high media attention that Apple gets lately made them high priority targets for hackers and malware, while Internet Explorer 8 has made important progress from a security point of view when compared with previous versions.</p>
<p>Anyway all important browsers have plenty of vulnerabilities. It is hard to say which one is more secure. What is certain – and it can be noticed from the number of vulnerabilities – is that Safari, Firefox and Chrome got important enough to be attractive for hackers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Micke</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8471</link>
		<dc:creator>Micke</dc:creator>
		<pubDate>Thu, 29 Jul 2010 18:13:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8471</guid>
		<description><![CDATA[This does not take into account the time each of those manufacturers take to present a patch to fix an issue...]]></description>
		<content:encoded><![CDATA[<p>This does not take into account the time each of those manufacturers take to present a patch to fix an issue&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Robert Okadar</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8469</link>
		<dc:creator>Robert Okadar</dc:creator>
		<pubDate>Thu, 29 Jul 2010 17:47:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8469</guid>
		<description><![CDATA[Only listing numbers (of vulnerabilities in this case) is not a reliable index how secure the product is. So Firefox has almost the most vulnerabilities, but they are also the most quickly patched (within weeks in average). While IE, on the other hand, has lower number of vulnerabilities, but it takes much longer for Microsoft to patch them (within months in average).
Naturally, while Firefox is OpenSource and everyone can see and inspect the source code, more vulnerabilities are also publicly revealed. IE is proprietary product (closed source) and many vulnerabilities discovered are actually never publicly revealed (if possible).

What do you think now - which one of these two is more secure?]]></description>
		<content:encoded><![CDATA[<p>Only listing numbers (of vulnerabilities in this case) is not a reliable index how secure the product is. So Firefox has almost the most vulnerabilities, but they are also the most quickly patched (within weeks in average). While IE, on the other hand, has lower number of vulnerabilities, but it takes much longer for Microsoft to patch them (within months in average).<br />
Naturally, while Firefox is OpenSource and everyone can see and inspect the source code, more vulnerabilities are also publicly revealed. IE is proprietary product (closed source) and many vulnerabilities discovered are actually never publicly revealed (if possible).</p>
<p>What do you think now &#8211; which one of these two is more secure?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jeff</title>
		<link>http://www.gfi.com/blog/top-15-vulnerable-applications/comment-page-1/#comment-8454</link>
		<dc:creator>Jeff</dc:creator>
		<pubDate>Thu, 29 Jul 2010 10:09:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2784#comment-8454</guid>
		<description><![CDATA[Same here! Very surprised that IE isn&#039;t at the top spot here.]]></description>
		<content:encoded><![CDATA[<p>Same here! Very surprised that IE isn&#8217;t at the top spot here.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 11:40:19 by W3 Total Cache --