• Latest

16,081 Vulnerabilities Recorded in Close to 2,500 Applications in 2015

16 March, 2016
China Liberal Education Holdings Limited Starts Higher Volume Production and Expands Domestic Sales Channels of All-in-one Machine AI-Space

China Liberal Education Holdings Limited Starts Higher Volume Production and Expands Domestic Sales Channels of All-in-one Machine AI-Space

19 December, 2020
Bell connecting Canadians at home for the holidays with free TV programming and no extra usage fees on residential Internet

Bell connecting Canadians at home for the holidays with free TV programming and no extra usage fees on residential Internet

18 December, 2020
TEMSA: Bus exports to be delivered to the heart of the European Union

TEMSA: Bus exports to be delivered to the heart of the European Union

18 December, 2020
EU tries to reshape the rules of the Internet

EU tries to reshape the rules of the Internet

17 December, 2020
Matterport Brings 3D Capture to the iPhone

Matterport Brings 3D Capture to the iPhone

5 May, 2020
NASA Administrator Statement on Agency Coronavirus Status

NASA Administrator Statement on Agency Coronavirus Status

15 March, 2020
Technology Supports Social Distancing in age of Covid-19

Technology Supports Social Distancing in age of Covid-19

15 March, 2020
Second Staff Exchange Between EU CyberSecurity Organizations

Second Staff Exchange Between EU CyberSecurity Organizations

19 February, 2020
Iranian Professor on the Iran-US escalation: “Iranians expected to hear a clear and steadfast condemnation from Turkish authorities over Soleimani’s death”

Iranian Professor on the Iran-US escalation: “Iranians expected to hear a clear and steadfast condemnation from Turkish authorities over Soleimani’s death”

16 February, 2020
Badly Trained Spam – Only A Quarter of Brits Train their Spam Filter

Badly Trained Spam – Only A Quarter of Brits Train their Spam Filter

6 February, 2020
Year 2020: What is the Status of 5G Rollout Worldwide and Turkey

Year 2020: What is the Status of 5G Rollout Worldwide and Turkey

31 January, 2020
Turkish Competition Authority’s Android Decision

Turkish Competition Authority’s Android Decision

18 December, 2019
  • About Us
  • Contact Us
  • Homepage
  • Latest News
  • News Widget
  • Privacy Policy
Friday, September 29, 2023
Social icon element need JNews Essential plugin to be activated.
  • Login
  • Register
Globaltelconews
Advertisement
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy
No Result
View All Result
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy
No Result
View All Result
Globaltelconews
No Result
View All Result

16,081 Vulnerabilities Recorded in Close to 2,500 Applications in 2015

globaltelconews-admin by globaltelconews-admin
16 March, 2016
in English
0

Maidenhead, U.K. March 16, 2016. Flexera Software, the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises, today released the Vulnerability Review 2016, the annual report from Secunia Research at Flexera Software, which presents global data on the prevalence of vulnerabilities and the availability of patches, maps the security vulnerability threat to IT infrastructures, and also explores vulnerabilities in the 50 most popular applications on private PCs.

Vulnerabilities are a root cause of security issues errors in software that can work as an entry point for hackers and be exploited to gain access to IT systems. In 2015, Secunia Research at Flexera Software recorded a total of 16,081 vulnerabilities in 2,484 products from 263 vendors. The breadth of the problem 16,081 vulnerabilities across 2,484 vulnerable products illustrates the challenge faced by IT teams trying to protect their environment against security breaches. For organisations to stay on top of their environments, IT teams must have complete visibility of the applications that are in use, and firm policies and procedures in place, in order to deal with the vulnerabilities as they are disclosed.

Drop in number of vulnerable products and number of vendors

The corresponding numbers for 2014 were 15,698 vulnerabilities in 3,907 products from 514 vendors.

The substantial 36 percent drop in number of products and 49 percent drop in vendors primarily reflects an adjustment in focus from Secunia Research to only monitor the systems and applications in use in the environments of customers of Flexera Softwares Software Vulnerability Management product line. This change is caused by a continuous rise in the number of vulnerabilities reported in recent years, and we are currently seeing other research houses choosing similar strategies CVE Mitre, for example, explained Kasper Lindgaard, Director of Secunia Research at Flexera Software.

Patch Rates and Zero-day Vulnerabilities

Other findings in the Vulnerability Review 2016 confirm trends from previous years: at 25, the number of zero-day vulnerabilities was the same as in 2014; the split between vulnerabilities in Microsoft and non-Microsoft products in the 50 most popular applications on private PCs is at 21 percent and 79 percent. And most vulnerabilities 84 percent have a patch available on the day of disclosure. 30 days after the vulnerability was first disclosed, only one additional percent has a patch. Particularly for organisations with a vast array of endpoints to manage – including devices not regularly connected to corporate networks – this means that a variety of mitigating software vulnerability management efforts are required, to ensure sufficient protection.

Key findings from the Vulnerability Review 2016

Total Numbers across All Applications

  1. In 2015, Secunia Research at Flexera Software recorded a total of 16,081 vulnerabilities in 2,484 products from 263 vendors.
  2. 84 percent of vulnerabilities in all products had patches available on the day of disclosure in 2015.
  3. 25 zero-day vulnerabilities were discovered in total in 2015, the same number as the year before.
  4. 13.3 percent of the 16,081 vulnerabilities discovered in 2015 were rated as Highly Critical, and 0.5 percent as Extremely Critical.
  5. In 2015, 1,114 vulnerabilities were discovered in the five most popular browsers: Google Chrome, Mozilla Firefox, Internet Explorer, Opera and Safari[1]. That is a 4 percent increase from 2014.
  6. In 2015, 147 vulnerabilities were discovered in the five most popular PDF readers: Adobe Reader, Foxit Reader, PDF-XChange Viewer, Sumatra PDF and Nitro PDF Reader.

The 50 Most Popular Applications on Private PCs

  1. 2,048 vulnerabilities were discovered in 25 products in the Top 50 most popular applications on private PCs.
  2. 79 percent of vulnerabilities in the 50 most popular applications on private PCs in 2015 affected non-Microsoft applications, by far outnumbering the 7 percent of vulnerabilities found in the Windows 7 operating system or the 14 percent of vulnerabilities discovered in Microsoft applications.
  3. The 17 non-Microsoft applications only account for 33 percent of products but are responsible for 79 percent of the vulnerabilities discovered in the Top 50.
    Microsoft applications (including the Windows 7 operating system) account for 67 percent of the products in the Top 50, but were only responsible for 21 percent of the vulnerabilities.
  4. Over a five-year period, the share of vulnerabilities in non-Microsoft applications hovers around 78 percent in the Top 50.
  5. The total number of vulnerabilities in the Top 50 most popular applications was 2,048 in 2015, showing a 77 percent increase in the five-year trend. Most of these were rated by Secunia Research at Flexera Software as either ‘Highly critical’ (62.8 percent) or ‘Extremely critical’ (8.6 percent).
  6. 85 percent of vulnerabilities in the Top 50 had patches available on the day of disclosure in 2015.

The annual Vulnerability Review from Secunia Research at Flexera Software analyses the evolution of software security from a vulnerability perspective. It presents global data on the prevalence of vulnerabilities and the availability of patches, maps the security threats to IT infrastructures, and also explores vulnerabilities in the 50 most popular applications on private PCs. These 50 applications are comprised of 33 Microsoft applications and 17 non-Microsoft applications.

[1] Although Apple Safari for Windows is categorised as end-of-life by Secunia Research, because it has not received maintenance and development for a period of three years, it is still found on 7% of PCs.

Previous Post

New European Organisation for Subsea Cables

Next Post

Despite Fast Adoption of Internet of Things, 72 % Of Consumers Dont Know How To Secure Their Connected Devices

Next Post

Despite Fast Adoption of Internet of Things, 72 % Of Consumers Dont Know How To Secure Their Connected Devices

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Navigation

  • Authors
  • Author Login
  • Author Application
  • Advertisement
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
Social icon element need JNews Essential plugin to be activated.

© 2018 Globaltelconews.com

No Result
View All Result
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy

© 2018 Globaltelconews.com

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In