SECURITY EVANGELIST

I have a theory about why people don’t care about their data’s security as much as they should.

From my experience, I’ve noticed that people have a difficult time relating to cyber security threats.

You may find yourself thinking: “What does all this techie stuff have to do with me?

Investing in cyber security might seem unnecessary, because you can’t really see it working for you, unless an attack strikes, but so is car insurance, and you definitely need that!

at least 3 applications you use are making your vulnerable to cyber attacks heimdal security

But let’s leave the cyber attack scenario aside for a second to focus on the (billion) other threats that aim to steal, destroy or hold your data captive.

And maybe you didn’t know this, but cyber criminals could also use your devices to expand their infrastructure and launch attacks on other targets.

So don’t think for a second that cyber attacks or cyber threats are only about technology!

In fact, cyber criminals’ methods have 3 main traits:

  • they’re advanced
  • they’re persistent
  • they’re always transforming.

Cyber criminals might be after your money, your resources, your personal information, you devices or even your access to third parties, such as the company you work for.

Whatever the objective is, they really do have tools and resources to launch powerful attacks on anyone, anywhere, anytime.

And it all starts with the software you use every single day.

8 software apps make 99 percent of computer vulnerable heimdal security

What about my software?

Software is imperfect, just like the people who make it.

No matter how much work goes into a new version of software, it will still be fallible.

Cyber criminals are after those exact glitches, the little security holes in the vulnerable software you use that can be exploited for malicious purposes.

For example, you’re probably using add-ons in your browser and think they’re harmless. Except they can be a way for cyber criminals to distribute malware and unwanted applications, or at least monitoring your browsing data. Suffice to say that malware creators are having a field day with this sort of attack pattern!

what type of software apps cyber criminals target heimdal security

But how can cyber attacks target so many people?

The answer is simple:
Cyber criminals are automation experts!

They create advanced forms of malware and computer viruses that can replicate themselves automatically and infect millions of computers around the world.

The more sophisticated the threat, the harder it will be to detect and block.

Why YOUR software is a valuable target:

Five reasons:

  • Because it’s flawed.
  • Because software vendors can hardly keep up with the way cyber criminals exploit vulnerabilities in their products.
  • Because it’s used by millions.
  • Because it gives them access to your computer in minutes.
  • Because you’re sometimes careless when using the Internet. (We’ve all been there, trust me.)

And the list could go on. But you get the picture, right?

Remember this:
OUTDATED SOFTWARE is the root of evil. Not all software evil, but it is a HUGE part of cyber threats.

what creates security gaps in software heimdal security

 

Did you know that 8 software apps make 99% of computers around the world vulnerable to cyber attacks?

I’m going to tell you all about, but first let me answer this question:

How are web attacks delivered?

90% of web attacks are delivered through advertising networks!

Click an infected banner on a legitimate website and you’ll end up with data-stealing malware or ransomware on your system!

Each time you ignore an update prompt from software you use, you’re exposing yourself to cyber threats and attacks.

So what types of applications can have security holes?

  • Browsers you use daily
  • Browser add-ons
  • Browser plugins
  • Desktop applications (and more).

You probably have at least 3 applications installed that make your computer vulnerable to cyber attacks!

70 percent of attacks target a vulnerability on your computer heimdal security

 

TOP VULNERABLE APPLICATIONS IN 2014

 

1. Google Chrome

Used by almost 64% of computers around the world, Chrome had 124 vulnerabilities in 2014. That’s 124 opportunities for cyber criminals to infect users, steal their data and do pretty much what they want.

Since the beginning of 2015, Chrome has had 15 vulnerabilities (CVE details), and the number will likely increase over the coming months.

google chrome vulnerabilities heimdal security

 

2. Mozilla Firefox

The second most used browser in the world – with a market share of over 20% – had 117 vulnerabilities last year. And Firefox users don’t seem to be aware of the dangers associated with outdated software.

mozilla firefox vulnerabilities heimdal security

 

3. Adobe Flash Player / Plugin

Adobe’s products are infamous for their vulnerabilities. Cyber criminals target them constantly! This year alone Flash Player has had 17 vulnerabilities and we’re not even halfway through 2015.

Adobe Flash Player has stolen the first place on cyber criminals’ to-exploit list, because it is now integrated in various products (such as Google Chrome), which makes it more difficult to patch.

Longer times between updates give cyber criminals time to wreak havoc!

adobe flash player vulnerabilities heimdal security

 

4. Oracle Java Runtime environment

Java was once at the top of the hitlist for cyber criminals everywhere. And it still is, despite exploits in this software having dropped by 34%.

Flash also interacts with Java, making such exploits much more difficult to identify and block! In turn, cyber criminals get to be more elusive, but also more effective.

oracle java vulnerabilities heimdal security

 

5. Adobe Air

This particular product from Adobe is a cross-platform system used for building desktop and mobile apps. In 2015 no less than 17 vulnerabilities have been identified in this piece of software. And it’s not the only one on your computer!

abobe air vulnerabilities heimdal security

 

6. Apple TV

“Told ya using Apple products is safer!”

Actually… No. If you’re reading this on an Apple product, you’re no safer from cyber threats than Windows users are. Or even Linux users, for that matter.

Apple TV made to the top 8 most exploited software in 2014. And it’s not doing great this year either: 23 vulnerabilities have been spotted so far!

apple tv vulnerabilities heimdal security

 

7. Adobe Reader

Highly sophisticated exploits target Adobe Reader all the time! And not only that, but in 2013 they also had a massive data breach, exposing 2.9 million customers and their data to other cyber threats.

You might as well switch to a different software for reading PDFs, but the top 5 most used products are also targeted by cyber criminal attacks.

adobe reader vulnerabilities heimdal security

 

8. Adobe Acrobat

Yes, this is the 3rd Adobe product on the list and it’s also problematic. In 2015 alone, 32 vulnerabilities have been observed and patched.

adobe acrobat vulnerabilities heimdal security

Cisco Annual Security Report 2015:

Exploits in outdated software will continue to be A TOP SECURITY ISSUE OF GREAT MAGNITUDE!

So this entire article may be left you wondering:

Should I stop using these applications to be safe?

Nope.

That’s not really an option.
These types of software are necessary, which is why they’re present on 99% of computers.

That makes 99% of computers vulnerable!

What should I do to be safe?

1. Use an automated patching tool to keep your software updated.
2. Use a tool traffic scanning tool to keep you from accessing infected web locations.
3. Use an application that can block advanced forms of malware, which antivirus can’t detect or block.
4. Use an antivirus in case you get infected.
5. Don’t click strange links, open suspicious emails or IMs and keep away from dangerous web locations (such as torrent websites).

Remember:
There is no way to ensure 100% cyber security for your data!

But that doesn’t mean you shouldn’t try!

See the full infographic below:

vulnerable software apps exposing you to cyber criminals - heimdal security

Share This Infographic On Your Site

See the full infographic below:

8 vulnerable software apps exposing your computer to cyber attacks - Heimdal Security

Share This Infographic On Your Site

The easy way to protect yourself against malware
Here's 1 month of Heimdal™ Threat Prevention Home, on the house!
Heimdal™ Threat Prevention Home
Use it to: Block malicious websites and servers from infecting your PC Auto-update your software and close security gaps Keep your financial and other confidential details safe

EASY AND RELIABLE. WORKS WITH ANY ANTIVIRUS.

Download Free Trial

NO CREDIT CARD REQUIRED

Comments

Are browsers built on Chrome like Brave also vulnerable?

Hi! I love your articles! I was curious if you had any updated info. about the vulnerabilities of these browser sites for 2018?

Hello, Amie! Many thanks for your kind words and feedback! We’ll do some research and update our article anytime soon. Thanks again!

thanks for the true information provided in this article

I would like to say thanks for sharing such a great information about security.I really appreciate this post.If you are looking for secure cloud hosting then visit https://www.whoa.com/public-cloud

1. Use an automated patching tool to keep your software updated. Example?
2. Use a tool traffic scanning tool to keep you from accessing infected web locations. Example?
3. Use an application that can block advanced forms of malware, which antivirus can’t detect or block. Example?
4. Use an antivirus in case you get infected. I do, also while I didn’t get infected yet.
5. Don’t click strange links, open suspicious emails or IMs and keep away from dangerous web locations (such as torrent websites). Can you define clearly:
strange links
suspicious emails or IMs
dangerous web locations

True, most of the stuff do not cite and are not very convincing. May be the facts are true, or may be they’re not! How would you know that 8 softwares make up 99% computers across the globe, and what are those softwares in the first place. The is just BS. 😐

We only publish statistics that we actively rely on and come from sources that are vetted by industry specialists. As all statistics, they are corroborated with our own data to reflect usage habits and other patterns that put users in danger. No one has 100% accurate statistics about usage habits, because no one has access to all of the computers in the world, but there are sets of data we can rely on to help people understand the amplitude of an issue. Thank you for your feedback!

All the data I have used in this article is real, public and can be verified with a simple Google search. It is true that I’m not a cyber security specialist in the sense that I do not analyze malware, but we do thorough research for every article and gather relevant and accurate data for it.

You can check the facts for yourself and consult other articles on the subject, so you can get a better opinion on the subject and decide what works best for you.

Hi Frans,

1. There are various solutions you can use for automated software patching, from Heimdal FREE (our own tool), Secunia PSI or other products. It really depends on your needs, so we encourage you to do some research to find out what fits your habits and system.
2 & 3 – here I’d recommend Heimdal PRO, which has some unique capabilities in terms of proactive malware detection. You can find out more about it and how it works here: https://heimdalsecurity.com/en/products/heimdal-pro
4. Antivirus is a must-have, but it can’t guarantee protection against the most advanced forms of malware. Just take a look at antivirus detection rates for new malware that we announce in our security alerts to get a better idea: https://heimdalsecurity.com/blog/security-alerts/
5. Suspicious links and IMs are usually unrequested. They can come from unknown senders or known senders who have been infected with malware. You can see some examples here: https://heimdalsecurity.com/blog/social-scams-breakdown-and-protection-plan/
Dangerous web locations can be P2P sharing websites, websites that look shoddy and are full of flashing banners, etc. It takes a bit of time and practice to single these out, but with some basic cyber security education (http://cybersecuritycourse.co/) you’ll be able to do it in no time.

I hope these helped!

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP