ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Programs Which Are Dangerous To Your Computer Security Due To Multiple Vulnerabilities

Updated on April 3, 2013
Adobe software such as Flash Player and Reader commonly include vulnerabilities which are fixed in frequent updates.
Adobe software such as Flash Player and Reader commonly include vulnerabilities which are fixed in frequent updates.

Kaspersky Labs, creator company of one of the most succcessful and powerful security suites available (Kaspersky Antivirus), recently announced their findings on a 2012 survey they had conducted.

Based on focused examination on security and privacy loop holes in a wide range of computer software in 2012, and using data gathered by their cloud-based Kaspersky Security Network, Kaspersky specialists have identified more than 132 million vulnerabilities in more than 11 million computer systems worldwide.
This number, with a simple division, indicates that there are approximately 12 vulnerabilities per computer user... a whooping number which shows that regardless of how computer and software have progressed throughout the years, still there is much to be done in terms of user privacy.
Moroever, what is quite astonishing is the fact that only in 2012, more than 800 software vulnerabilities have surfaced.

Oracle Java is a necessary software for every computer, thus it is a standard target of cyber criminals who gain advantage of its vulnerabilities.
Oracle Java is a necessary software for every computer, thus it is a standard target of cyber criminals who gain advantage of its vulnerabilities.

The Worrying Findings

Cyber cirminals typically target specific software which exists in all systems regardless of operating system - Adobe Reader, Adobe Flash Player and Java are 3 of them. Surprisingly, in 2012, only 8 vulnerabilities were identified in these three applications and that is definitely a step forward. Java was found to contain 5 loop holes, Flash player had two, and only one vulnerability for Acrobat Reader, which is widely used.

These tools however still are a powerful way in the hands of hackers who aim to bypass user security software and attempt to gain access to private data computers, sensitive information such as credit card numbers and sometimes even sabotage industrial systems or government websites.

Aside indicating the multiple vulnerabilities of widely used software, Kaspersky Labs also state that users tend to delay or even avoid updating their software to the latest version, even if it is free of charge and even if they are notified that the latest version fixes security loop holes of the previous ones. The particular analysis shows some worrying results; older versions of software remain installed and are commonly still used - the danger of data loss and privacy risks are of higher level.

In particular, the survey showed that 6 weeks after the notification of a new version of Java becoming available ( September-October 2012), only the 28.2% of users managed to update their systems to it. More than 70% of the computer systems were left vulnerable to cyber criminals who had already found out how to manipulate the loop holes of the older versions. More examples of the same problem - an obsolete, full of loop holes version of Flash Player from 2010 ( three years old!) was still active in 10.2% of systems and didn't seem to decrease - that means the users would not remove and update. Similarly, a serious security vulnerability found in Adobe Reader in 2011 was still present in the 13.5% of systems examined.

The numbers might be boring, but the truth is that software vulnerabilities are a huge concern for privacy, be it single-user or large companies. It isn't hard to decrease the dangers from the afore mentioned issues; the updates are free, notification on their availability is on time and the loop holes are fixed quite fast.

Additionally, there is no reason anymore that computer systems remain unprotected; most computers worldwide have internet access, many worthy antivirus and other security software are provided for free and in general, all we need to do is be cautious with what we do on the web, regularly update our software and antivirus and have some common sense.

How Often Do You Update Your Software?

See results


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)