Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/21/2009
08:52 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Secunia Pushes For Standard That Updates Consumer Apps

Danish security firm asks software vendors to help build common application that handles all third-party application updates and patching

SAN FRANCISCO -- RSA CONFERENCE 2009 -- Danish security firm Secunia is attempting to rally other software vendors to develop an industry-standard tool that automatically updates all applications on a consumer's PC.

Niels Henrik Rasmussen, CEO of Secunia, says it's time the industry built a common application that handles all third-party application updates and patching, rather than the separate, piecemeal approach used today.

Secunia points to new data from Microsoft's Security Incident Report, which revealed that 90 percent of vulnerabilities on Windows machines are in third-party applications. And many third-party application firms don't educate or alert consumers about security updates and how to install them, according to Secunia.

"I would not hesitate to say that the biggest threat to your PC probably is a program you installed yourself, simply because it is out of date and insecure," says Thomas Kristensen, CTO of Secunia, here at the RSA Conference. "Many software companies fail to properly inform their users about new security updates and how to apply them after you installed their software."

Secunia's Rasmussen says he's meeting with software vendors here this week to invite them to address this problem. Secunia is offering its Personal Software Inspector (PSI) tool, which handles updates on 7,000 different third-party applications, as a foundation for building out an integrated application for updating all of these apps. Rasmussen says Secunia would like the software community to take the solution to the next level, but the final product may or may not look anything like PSI, he says.

"We need one application that handles everything," Rasmussen says. "We're offering our technology, but it could [ultimately] be something completely different."

Secunia envisions an industry-standard app that runs when a laptop starts up, for example, scanning for unpatched or vulnerable apps and guiding the user with simple point-and-click options to update the machine. "Patching is not rocket science. Why hasn't [the industry] done this before?" says Rasmussen, who notes that Secunia would rather the industry take responsibility for fixing this problem than continue to invest in the development of its PSI tool to do so. Whether vendors will be willing to join Secunia in the effort is unclear. But if Secunia can't get vendors to commit to the project, Rasmussen says the company will go at it alone. "It's in the interest of the community to do this, and it makes sense," he says. "If they won't do it, we will."

Meanwhile, Secunia also announced here that it is offering U.S. financial institutions Online Software Inspector -- a tool it has been selling in Europe for securing online banking customers' systems. The software automatically scans a banking customer's machine for unpatched or vulnerable software when he or she logs into the online banking app.

"Patching third-party software is probably the most important thing a private user can do in relation to his or her IT security," says Mikkel Winther, partner manager at Secunia. "Many banks already have requirements about browser versions, operating systems, and service pack levels, but since the majority of attacks use third-party applications, this is where the banks should focus. This is where the lowest-hanging fruit is found."

Winther says the software will be priced around $1 per online banking customer user, and will include volume discounts. "It provides banks the real-time security situation of these users," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.