Vulnerability intelligence firm Secunia has released its Q2 quarterly country report for US and 14 other countries around the world. Big take away this round is the continued massive vulns out there on PDF readers. Kasper Lindgaard, Director of Research and Security at Secunia commented on the releasing of Q2 report.
Kasper Lindgaard, Director of Research and Security at Secunia :
“PDF readers remain one of the world’s most popular targets for hackers so it is concerning that we are still seeing 75% of PCs that have Adobe Reader 10 or 11 installed are unpatched. There are steps that PC users can take to defend themselves, and any system they are connected to, against known exploits. By upgrading to the latest version of the program and by applying priority patches in a timely manner, PC users can make great strides towards minimising their exposure to security risks.”
The report break down how much and what type of vulnerable software is currently installed on private PCs including :
- Software application programs installed (and by how many vendors)
- End-of-life programs installed
- Unpatched third party programs
- Origin of vulnerabilities
- Most exposed programs (and current market share of each)
- End of life programs
Reports can be accessed at :
Visit HERE.
Visit HERE [su_box title=”About Secunia” style=”noise” box_color=”#336588″]Founded in 2002, Secunia is a leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats, risks across their networks, and end-points. This is enabled by Secunia’s award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets.
Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. Secunia is headquartered in Copenhagen, Denmark.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.