More than half of attacks aimed at Java

Posted: October 30, 2012 in IT Security News
Tags: , , , , , , ,

Kaspersky Lab

main types of vulnerable applications

Kaspersky Lab has identified five main types of vulnerable applications, which using exploits. The study of viral activity in the third quarter of 2012, more than 50% of the attacks were used loopholes in Java. Updates of the software installed on the user’s request, not automatically, which increases time life of the vulnerability. Java exploits are fairly easy to use under any version of Windows, and with some work attackers, as was the case with Flashfake, the exploit can be cross-platform. This explains the special interest cybercriminals java-vulnerabilities.

In second place attack through Adobe Reader, which accounted for a quarter of all reflected attacks. Gradually popular exploits this application is reduced, due to the rather simple mechanism for their detection and automatic updates introduced in the latest version. About 3% of the attacks were in exploits the vulnerability in Windows Help and Support Center, as well as various vulnerabilities in the browser Internet Explorer.

Errors in Flash-player files are subject to scrutiny intruders. According to Kaspersky Security Network system for the third quarter of 2012, the ten most common vulnerabilities were two “representative» Adobe Flash. Close the top five exploits for devices running Android OS. Their main goal – to make imperceptible “jailbreak” and provide any programs, including malware, full access to the memory and features of the phone or tablet.

“The Internet today is Wednesday very ” aggressive. ” Infection can be almost any site, and as a result of visitors who have vulnerable applications, are victims of attacks, – says a leading anti-virus expert “Kaspersky Lab” Jury Namestnikov. – The main purpose of virus writers – are electronic accounts or confidential user data, which ultimately give cybercriminals the opportunity to cash out the money. Therefore, attackers use all means at their arsenal of methods to deliver malware on the user’s computer, and the use of exploits in this case one of the most popular ways. ”

Types of vulnerable applications

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s