Thursday, February 27, 2025
HomeComputer SecurityMillions of Devices Found Running Outdated Versions of the Famous Softwares

Millions of Devices Found Running Outdated Versions of the Famous Softwares

Published on

SIEM as a Service

Follow Us on Google News

According to 2019 Avast PC Report, Millions Computers are running outdated versions of the popular softwares such as VLC, Skype, Java and Foxit reader are not updated.

The data extracted in this reprt is from 163 million PCs and the report covers the most popular Pcs, software, and hardware used today worldwide.

Oudated softwares are the biggest threats of cyber attack, they provides attackers to exploit the atrget with known vulnerabilities and to gain unauthorized access to the system.

Outdated Versions
Image Source: Avast

Following are the most installed softwares of 2018 that includes, Google Chrome, Adobe Reader, WinRAR, Microsoft Office, and Mozilla Firefox.

Among the apps installed 55% of them are not the latest versions,those apps using the frameworks and tools, contain vulnerabilities and for security reasons should be updated immediately.

Outdated Versions
Image Source: Avast

Around the globe windows 7 is the still most popularly used OS and windows vista is the rarely used OS. 9% of all Windows 10 operating systems used by users globally are out-of-date and potentially vulnerable.

Office is one of the most used applications worldwide and one of the most out-of-date. Number of exploit kits targets Microsoft Office vulnerabilities that allows attackers to execute malicious scripts silently on the victim machine.

In a recent campaign hackers abuse Critical flaw in Microsoft word Online Video future that allows attackers to deliver malware into the victim’s system

According to report 63% of PCs are laptops, Half of the users have 4 GB of memory and Only 15% of users own a fast SSD.

Related Read

Android Released First Security updates for 2019 & Fixed 13 vulnerabilities – Update Your Phone Now

Spyware From Google Play as a Legitimate Android Apps That Infected 196 Country Users

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...