Preview

Secuna, The IT Security Solutions Leader Publishes a Vulnerability Update with the Top 20 Vulnerable Products for May, June and July

Satisfactory Essays
Open Document
Open Document
578 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secuna, The IT Security Solutions Leader Publishes a Vulnerability Update with the Top 20 Vulnerable Products for May, June and July
PressReleasePing

Secunia Report: Vulnerability Update for
May-July 2015 out now - comments from
Research on Stagefright, Avant and yearly trends Secunia, a leading provider of IT security solutions that enable management and control of vulnerability threats, today published a Vulnerability Update with the Top 20 vulnerable products for May, June and July.
Copenhagen, Denmark, September 09, 2015 /PressReleasePing/ -Secunia, a leading provider of IT security solutions that enable management and control of vulnerability threats
, today published a Vulnerability Update with the Top 20 vulnerable products for May, June and July. The product with the most vulnerabilities over the three month period was the Avant browser, and once again, IBM comes in as the vendor with the largest number of vulnerable products. It is the fourth time Secunia has issued a Vulnerability Update. The recurring update provides a monthly Top 20 of products with the most vulnerabilities recorded over a three month period, along with brief comments from Secunia Research. The first edition was published in
June 2014.

In this latest edition, Secunia Research provides commentary on vulnerability issues tied to the Avant browser, Stagefright Android media player, and the troubling escalation in the number of vulnerable products to date between January – July of this year. The Vulnerability
Update also lists the number of new vulnerabilities in the Top 20 over the 3 month period:
2,211; the vendor with most vulnerable products in the 3 month period: IBM, and the product with the most vulnerabilities: Avant Browser.

As you look through the Top 20 lists of vulnerable products published in the reports, it is clear that it is completely erratic which product names make it onto the lists from month to month.

“For as long as Secunia has been in business, we have tried to get exactly that message

across to IT security professionals across industries: you cannot predict what products will be making your

You May Also Find These Documents Helpful

  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    What is the name of the Microsoft® Windows 2003 XP server Security Patch needed to remediate this software vulnerability and exploit?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Individual Security Solutions. NTC 411 Week 5 Summary.…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    8. It’s a tool for practitioners because they can see what vulnerability they need to correct and patch,and it’s a hacker’s tool because it lists the vulnerability they can exploit.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number two web based attack of 2009 was the Microsoft Internet Explorer ADODB.Stream Object file installation weakness. This exploit accounted for 18% of the total number of web based exploits for the year.This vulnerability allows hackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. In…

    • 601 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Manufacturing conducts an information systems security review over IT security issues that exist in different plants to prepare for an upcoming audit in accordance to the Sarbanes-Oxley Act. Several elements of the organization 's information systems require revisions and updates to optimize physical and network security, data security, and Web security.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 340 Words
    • 2 Pages

    975497 CVE-2009-3103: Vulnerabilities in SMB could allow remote code execution. Windows Vista Service Pack 1 and 2…

    • 340 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Final Study Guide

    • 2229 Words
    • 8 Pages

    2. Open source SW vulenrabilities can take months to fix because most people working on it are volunteers.…

    • 2229 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Tjx Security Breach

    • 1008 Words
    • 5 Pages

    1 When TJX first noticed the issue in Dec of 2006, intrusions had been occurring for at least 16 months,…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    RATS, because the running of static code analysis tools that attempt to highlight possible vulnerabilities within ‘static’ (non-running) source code.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays