About
Subscribe

Software apps lead to infection

Staff Writer
By Staff Writer, ITWeb
Johannesburg, 21 Apr 2010

The most vulnerable applications during 2009 included:

* Adobe Acrobat, Adobe Reader
* Adobe Flash Player
* Adobe Shockwave
* Apple Quick Time
* Apple Safari
* Mozilla Firefox
* Opera Browser
* RealNetworks RealPlayer
* Sun Java
* Trillian

New vulnerabilities will remain the primary cause of virus epidemics going forward. However, vulnerabilities in operating systems are not the only way for a hacker to gain access to computers.

So says Kaspersky Lab in its latest cyber threat forecast for 2010. “Last year, cyber criminals focused on down vulnerabilities in the software developed by companies like Adobe, to breach a user's and make use of the compromised digital resources for their malicious intents.” The company says a similar trend is presenting itself in 2010.

Last year, Kaspersky says hackers were relentless in their attempts to exploit popular applications, in order to either implement denial-of-service attacks or create arbitrary codes to access privileged data. “Any user is a potential target for cyber criminals. Users should always exercise caution, even when using an application that is trusted by millions of people globally.”

According to Costin Raiu, chief expert, EEMEA, Kaspersky Lab Global Research & Analytics Team, June 2010 will see a massive explosion in both the availability and the adoption of mobile content as text, multimedia messaging based news services and mobile portals. These media will be used to access news and content around Soccer World Cup tournament to South Africans and visitors alike.

“As long as there are people with malicious intents and the urge to get access into your system, a user's favourite applications will always be a target and 2010 will be no different, especially with the demand for rich, high-quality applications,” he says.

However, Raiu says the threat to applications does not necessarily mean users should delete the applications they use out of fear. “They should preferably keep them updated and be aware of any security issues and developments.”

Raiu says current security solutions use technologies such as sandboxing or the ability to run untrusted apps within a virtual quarantine zone, which can prevent breaches and key-logging activities.

“Though one can never be too safe, if a user is well-informed on the applications they use and on how to avoid trouble, they will at least maximise the chances of not falling into the traps of the digital world,” he concludes.

Share