Monday, October 7, 2024
HomeComputer SecurityMillions of Devices Found Running Outdated Versions of the Famous Softwares

Millions of Devices Found Running Outdated Versions of the Famous Softwares

Published on

According to 2019 Avast PC Report, Millions Computers are running outdated versions of the popular softwares such as VLC, Skype, Java and Foxit reader are not updated.

The data extracted in this reprt is from 163 million PCs and the report covers the most popular Pcs, software, and hardware used today worldwide.

Oudated softwares are the biggest threats of cyber attack, they provides attackers to exploit the atrget with known vulnerabilities and to gain unauthorized access to the system.

- Advertisement - EHA
Outdated Versions
Image Source: Avast

Following are the most installed softwares of 2018 that includes, Google Chrome, Adobe Reader, WinRAR, Microsoft Office, and Mozilla Firefox.

Among the apps installed 55% of them are not the latest versions,those apps using the frameworks and tools, contain vulnerabilities and for security reasons should be updated immediately.

Outdated Versions
Image Source: Avast

Around the globe windows 7 is the still most popularly used OS and windows vista is the rarely used OS. 9% of all Windows 10 operating systems used by users globally are out-of-date and potentially vulnerable.

Office is one of the most used applications worldwide and one of the most out-of-date. Number of exploit kits targets Microsoft Office vulnerabilities that allows attackers to execute malicious scripts silently on the victim machine.

In a recent campaign hackers abuse Critical flaw in Microsoft word Online Video future that allows attackers to deliver malware into the victim’s system

According to report 63% of PCs are laptops, Half of the users have 4 GB of memory and Only 15% of users own a fast SSD.

Related Read

Android Released First Security updates for 2019 & Fixed 13 vulnerabilities – Update Your Phone Now

Spyware From Google Play as a Legitimate Android Apps That Infected 196 Country Users

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...