Attacks/Breaches

1/23/2019
04:15 PM
50%
50%

Aging PCs Running Out-of-Date Software Bring Security Worries

Age is an issue with application languages and frameworks, too.

More than half of the software running on PCs around the world is outdated, with millions of users still logging into computers running Windows Vista and XP. That's just some of the information to come from a new report on PC software and the risks posed to security.

The "Avast 2019 PC Trends Report" is based on anonymized data from 163 million computers running Avast and AVG security software. It presents information on both the hardware and software running the world's business and personal applications — and the picture it paints is of an infrastructure growing older with each passing year.

In fact, the average age of a desktop PC is 6 years old, up from 5.5 years old in 2017. That's compared with less than a three-year average life span for a smartphone. Age continues to be an issue with application languages and frameworks, too. According to the report's authors, "Our report shows that the number of installed tools and frameworks is higher than 'real' apps, such as Office or Skype. In some cases, these aren't being kept up-to-date by the user or the vendor."

Read more here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/24/2019 | 6:48:02 AM
No surprise
As a private consultant a few years ago, before moving to Georgia, I had many clients running relatively old (3 years or so) old sysems.  It ws my job, of course, to advocate for newer systems and in this I was pretty good, keeping an eye on budgets.  Medical offices were the hardest - they were tight with dollars perhaps because a $20,000 piece of equipment hurts so that is the way they think of everything.  501C3 were also hard but that was a real budget concern.  A few have almos gone under since I left for Georgia.  The trick was if not totally new, to go back a year or so.  Dell had a great refurb site, still exists, for systems off lease and a year old.  That is not too bad and helped the budgets.  Going totally NEW can be a dollar breaker.  I wish it were otherwise.  I had good backup and restore procedures though and defeated ransomware on a few occasions through catalog backups and home based off-site systems of my own.  (30 computers in the basement).  

 

Update - generally it was always a question of $$ as opposed to everything IS WORKING - why do we need to replace?  Tech answers are not understood.  
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.