<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Top Most Vulnerable Applications and Operating Systems in 2010</title>
	<atom:link href="http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-vulnerable-applications-operating-systems-2010</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Onion</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-32163</link>
		<dc:creator>Onion</dc:creator>
		<pubDate>Sun, 15 Apr 2012 16:54:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-32163</guid>
		<description><![CDATA[There is a perception that &quot;As long as it&#039;s not Microsoft then I am safe&quot;.  Microsoft has put security at the forefront on their products. Their patch cycle is much more robust than some other companies.]]></description>
		<content:encoded><![CDATA[<p>There is a perception that &#8220;As long as it&#8217;s not Microsoft then I am safe&#8221;.  Microsoft has put security at the forefront on their products. Their patch cycle is much more robust than some other companies.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jenna Ardi</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-25393</link>
		<dc:creator>Jenna Ardi</dc:creator>
		<pubDate>Mon, 14 Mar 2011 06:15:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-25393</guid>
		<description><![CDATA[I&#039;m surprised that Google Chrome OS and Chromium OS were not in the list for the most targeted operating systems in 2010.

The United States Computer Emergency Readiness Team stated last January 13, 2011 that &quot;Google Chrome contains multiple vulnerabilities that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.&quot; 

Although this problem can be fixed through software update, it still proves that the Google Chrome OS is receptive to most OS vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m surprised that Google Chrome OS and Chromium OS were not in the list for the most targeted operating systems in 2010.</p>
<p>The United States Computer Emergency Readiness Team stated last January 13, 2011 that &#8220;Google Chrome contains multiple vulnerabilities that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.&#8221; </p>
<p>Although this problem can be fixed through software update, it still proves that the Google Chrome OS is receptive to most OS vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Brian Camilleri</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-23826</link>
		<dc:creator>Brian Camilleri</dc:creator>
		<pubDate>Sat, 05 Mar 2011 22:35:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-23826</guid>
		<description><![CDATA[Great comparision, I am so glad to see Microsoft is trying what is possible to make its products better and secure. This information helps any person placed in a situation to decide which OS to use to make the right decision.

Great Work.

Brian]]></description>
		<content:encoded><![CDATA[<p>Great comparision, I am so glad to see Microsoft is trying what is possible to make its products better and secure. This information helps any person placed in a situation to decide which OS to use to make the right decision.</p>
<p>Great Work.</p>
<p>Brian</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cristian Florian</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-22834</link>
		<dc:creator>Cristian Florian</dc:creator>
		<pubDate>Mon, 28 Feb 2011 18:31:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-22834</guid>
		<description><![CDATA[@FOSS

Definitely Internet Explorer numbers would be higher if its code would be publicly available.
However the trends in the past years, when we take each browser individually, are not influenced by this.

For Internet Explorer the numbers are:
2007 -&gt; 68
2008 -&gt; 66
2009 -&gt; 58
2010 -&gt; 59

For Firefox they are:
2007 -&gt; 77
2008 -&gt; 93
2009 -&gt; 128
2010 -&gt; 103

For Safari they are:
2007 -&gt; 41
2008 -&gt; 39
2009 -&gt; 70
2010 -&gt; 122

As you can notice Internet Explorer is the only browser that is having a descendant trend in the last four years. This means that:
-	Microsoft did improve security in the latest versions of Internet Explorer
-	This is another way to show that Internet Explorer lost market share and the other browsers gained and therefore they become more attractive for hackers and security researchers looking for vulnerabilities]]></description>
		<content:encoded><![CDATA[<p>@FOSS</p>
<p>Definitely Internet Explorer numbers would be higher if its code would be publicly available.<br />
However the trends in the past years, when we take each browser individually, are not influenced by this.</p>
<p>For Internet Explorer the numbers are:<br />
2007 -&gt; 68<br />
2008 -&gt; 66<br />
2009 -&gt; 58<br />
2010 -&gt; 59</p>
<p>For Firefox they are:<br />
2007 -&gt; 77<br />
2008 -&gt; 93<br />
2009 -&gt; 128<br />
2010 -&gt; 103</p>
<p>For Safari they are:<br />
2007 -&gt; 41<br />
2008 -&gt; 39<br />
2009 -&gt; 70<br />
2010 -&gt; 122</p>
<p>As you can notice Internet Explorer is the only browser that is having a descendant trend in the last four years. This means that:<br />
-	Microsoft did improve security in the latest versions of Internet Explorer<br />
-	This is another way to show that Internet Explorer lost market share and the other browsers gained and therefore they become more attractive for hackers and security researchers looking for vulnerabilities</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cristian Florian</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-22827</link>
		<dc:creator>Cristian Florian</dc:creator>
		<pubDate>Mon, 28 Feb 2011 17:58:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-22827</guid>
		<description><![CDATA[@ Brian
Strictly speaking it is people who are targeting these. And the first step to create an exploit is to find a vulnerability.

The number of publically known vulnerabilities correlates with the interest hackers have to use the product as an attack vector. 

Indeed today Adobe Reader vulnerabilities, for instance, are more important than Google Chrome ones because Adobe Reader is more widely in use, especially in corporate environments.

But Google Chrome is definitely on an ascendant path in capturing interest and becoming more “targeted”. The trend is obvious if we are looking at the numbers of vulnerabilities for it in the past three years (again the source is National Vulnerability Database):

2008 -&gt; 11 vulnerabilities
2009 -&gt; 31 vulnerabilities
2010 -&gt; 152 vulnerabilities

I know that Java and Adobe Reader/Acrobat are widely exploited, but I don’t have exact figures. You are very sure that they are by far on the first place. Can you share with us the sources/facts that determined you to do this affirmation?]]></description>
		<content:encoded><![CDATA[<p>@ Brian<br />
Strictly speaking it is people who are targeting these. And the first step to create an exploit is to find a vulnerability.</p>
<p>The number of publically known vulnerabilities correlates with the interest hackers have to use the product as an attack vector. </p>
<p>Indeed today Adobe Reader vulnerabilities, for instance, are more important than Google Chrome ones because Adobe Reader is more widely in use, especially in corporate environments.</p>
<p>But Google Chrome is definitely on an ascendant path in capturing interest and becoming more “targeted”. The trend is obvious if we are looking at the numbers of vulnerabilities for it in the past three years (again the source is National Vulnerability Database):</p>
<p>2008 -&gt; 11 vulnerabilities<br />
2009 -&gt; 31 vulnerabilities<br />
2010 -&gt; 152 vulnerabilities</p>
<p>I know that Java and Adobe Reader/Acrobat are widely exploited, but I don’t have exact figures. You are very sure that they are by far on the first place. Can you share with us the sources/facts that determined you to do this affirmation?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: FOSS</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-22581</link>
		<dc:creator>FOSS</dc:creator>
		<pubDate>Sat, 26 Feb 2011 23:47:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-22581</guid>
		<description><![CDATA[The reason Chrome is #1, Safari #2, Webkit #3, and Firefox #4 is because all of these browsers are open-source.  When a project is open-source there is a much more transparent bug reporting method -- most bugs found are considered potential security issues.  On the upside, this means bugs are usually patched much more quickly than those in the closed source world.

Internet Explorer is closed-source which means it takes a little more work to discover flaws (but it doesn&#039;t stop flaws from being discovered, as we all know).  Moreover, Microsoft is under no obligation to report all vulns that they themselves find.  If IE were open-sourced, you would see that it would have similar numbers to Chrome and FF.]]></description>
		<content:encoded><![CDATA[<p>The reason Chrome is #1, Safari #2, Webkit #3, and Firefox #4 is because all of these browsers are open-source.  When a project is open-source there is a much more transparent bug reporting method &#8212; most bugs found are considered potential security issues.  On the upside, this means bugs are usually patched much more quickly than those in the closed source world.</p>
<p>Internet Explorer is closed-source which means it takes a little more work to discover flaws (but it doesn&#8217;t stop flaws from being discovered, as we all know).  Moreover, Microsoft is under no obligation to report all vulns that they themselves find.  If IE were open-sourced, you would see that it would have similar numbers to Chrome and FF.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Brian  Eckman</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-22365</link>
		<dc:creator>Brian  Eckman</dc:creator>
		<pubDate>Thu, 24 Feb 2011 21:52:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-22365</guid>
		<description><![CDATA[Since when do *vulnerabilities* &quot;target&quot; applications, operating systems, and such? They don&#039;t! EXPLOITS target these. Google Chrome isn&#039;t the most &quot;targeted&quot; browser - it simply is the browser that had the &quot;high severity&quot; vulnerabilities listed within the National Vulnerability Database for the previous year.

As far as what software is/was most frequently exploited via the Internet to install malicious code, Java and Adobe Acrobat/Reader are pretty much tied for #1, with nothing remotely close to being next in line.]]></description>
		<content:encoded><![CDATA[<p>Since when do *vulnerabilities* &#8220;target&#8221; applications, operating systems, and such? They don&#8217;t! EXPLOITS target these. Google Chrome isn&#8217;t the most &#8220;targeted&#8221; browser &#8211; it simply is the browser that had the &#8220;high severity&#8221; vulnerabilities listed within the National Vulnerability Database for the previous year.</p>
<p>As far as what software is/was most frequently exploited via the Internet to install malicious code, Java and Adobe Acrobat/Reader are pretty much tied for #1, with nothing remotely close to being next in line.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cristian Florian</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-21915</link>
		<dc:creator>Cristian Florian</dc:creator>
		<pubDate>Mon, 21 Feb 2011 12:46:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-21915</guid>
		<description><![CDATA[Indeed, 2010 was a rich year in security updates. Microsoft alone has released 106 security bulletins, which is a company all time record.]]></description>
		<content:encoded><![CDATA[<p>Indeed, 2010 was a rich year in security updates. Microsoft alone has released 106 security bulletins, which is a company all time record.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: callmecool</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-21828</link>
		<dc:creator>callmecool</dc:creator>
		<pubDate>Mon, 21 Feb 2011 02:03:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-21828</guid>
		<description><![CDATA[Another reason why you should never buy pirated goods! Try it once and it destroyed my system. I lost almost all my files.]]></description>
		<content:encoded><![CDATA[<p>Another reason why you should never buy pirated goods! Try it once and it destroyed my system. I lost almost all my files.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carmen Sidir</title>
		<link>http://www.gfi.com/blog/top-vulnerable-applications-operating-systems-2010/comment-page-1/#comment-21827</link>
		<dc:creator>Carmen Sidir</dc:creator>
		<pubDate>Mon, 21 Feb 2011 02:01:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3130#comment-21827</guid>
		<description><![CDATA[Well, I guess we all know the reason why they&#039;re the most targeted. They&#039;re also the most popular. But what sets them apart from the other applications is they&#039;re constantly updated by their developers. So although it&#039;s making me anxious, I&#039;m not completely worried.]]></description>
		<content:encoded><![CDATA[<p>Well, I guess we all know the reason why they&#8217;re the most targeted. They&#8217;re also the most popular. But what sets them apart from the other applications is they&#8217;re constantly updated by their developers. So although it&#8217;s making me anxious, I&#8217;m not completely worried.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:34:18 by W3 Total Cache --