Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/21/2009
08:52 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Secunia Pushes For Standard That Updates Consumer Apps

Danish security firm asks software vendors to help build common application that handles all third-party application updates and patching

SAN FRANCISCO -- RSA CONFERENCE 2009 -- Danish security firm Secunia is attempting to rally other software vendors to develop an industry-standard tool that automatically updates all applications on a consumer's PC.

Niels Henrik Rasmussen, CEO of Secunia, says it's time the industry built a common application that handles all third-party application updates and patching, rather than the separate, piecemeal approach used today.

Secunia points to new data from Microsoft's Security Incident Report, which revealed that 90 percent of vulnerabilities on Windows machines are in third-party applications. And many third-party application firms don't educate or alert consumers about security updates and how to install them, according to Secunia.

"I would not hesitate to say that the biggest threat to your PC probably is a program you installed yourself, simply because it is out of date and insecure," says Thomas Kristensen, CTO of Secunia, here at the RSA Conference. "Many software companies fail to properly inform their users about new security updates and how to apply them after you installed their software."

Secunia's Rasmussen says he's meeting with software vendors here this week to invite them to address this problem. Secunia is offering its Personal Software Inspector (PSI) tool, which handles updates on 7,000 different third-party applications, as a foundation for building out an integrated application for updating all of these apps. Rasmussen says Secunia would like the software community to take the solution to the next level, but the final product may or may not look anything like PSI, he says.

"We need one application that handles everything," Rasmussen says. "We're offering our technology, but it could [ultimately] be something completely different."

Secunia envisions an industry-standard app that runs when a laptop starts up, for example, scanning for unpatched or vulnerable apps and guiding the user with simple point-and-click options to update the machine. "Patching is not rocket science. Why hasn't [the industry] done this before?" says Rasmussen, who notes that Secunia would rather the industry take responsibility for fixing this problem than continue to invest in the development of its PSI tool to do so. Whether vendors will be willing to join Secunia in the effort is unclear. But if Secunia can't get vendors to commit to the project, Rasmussen says the company will go at it alone. "It's in the interest of the community to do this, and it makes sense," he says. "If they won't do it, we will."

Meanwhile, Secunia also announced here that it is offering U.S. financial institutions Online Software Inspector -- a tool it has been selling in Europe for securing online banking customers' systems. The software automatically scans a banking customer's machine for unpatched or vulnerable software when he or she logs into the online banking app.

"Patching third-party software is probably the most important thing a private user can do in relation to his or her IT security," says Mikkel Winther, partner manager at Secunia. "Many banks already have requirements about browser versions, operating systems, and service pack levels, but since the majority of attacks use third-party applications, this is where the banks should focus. This is where the lowest-hanging fruit is found."

Winther says the software will be priced around $1 per online banking customer user, and will include volume discounts. "It provides banks the real-time security situation of these users," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10101
PUBLISHED: 2019-07-23
ServiceStack ServiceStack Framework 4.5.14 is affected by: Cross Site Scripting (XSS). The impact is: JavaScrpit is reflected in the server response, hence executed by the browser. The component is: the query used in the GET request is prone. The attack vector is: Since there is no server-side valid...
CVE-2019-10102
PUBLISHED: 2019-07-23
Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the...
CVE-2019-10102
PUBLISHED: 2019-07-23
Jeesite 1.2.7 is affected by: SQL Injection. The impact is: sensitive information disclosure. The component is: updateProcInsIdByBusinessId() function in src/main/java/com.thinkgem.jeesite/modules/act/ActDao.java has SQL Injection vulnerability. The attack vector is: network connectivity,authenticat...
CVE-2018-18670
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Extra Contents" parameter, aka the adm/config_form_update.php cf_1~10 parameter.
CVE-2018-18672
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.