Ready To Make The Switch To Your Local IT Experts? Call 419-872_-9119

The continued exploit of many vulnerable applications that have been fixed by vendors for over a year highlight the need to keep software updated with the latest versions and patches.

A new report released by security firm M86 Security reveals a trend toward more sophisticated forms of malware in taking advantage of vulnerabilities in common software applications and developing techniques to avoid detection.

In M86’s report, among the applications commonly exploited are Microsoft’s Internet Explorer and Adobe Reader. Another vector for malware that hackers have been using recently is Java and Adobe’s Flash—which are installed on many PCs, often as plug-ins to most browsers.

Although the vulnerabilities in these applications have been identified and patched for over a year, failure to keep up with the latest updates have made many systems still vulnerable to attack. Our customers taking advantage of our Managed Security need not worry, since we make sure our customers’ systems are patched as soon as updates become available. Find out more about our Security Offerings today.

Published with permission from TechAdvisory.org. Source.

Published on 10th August 2010 by Jeanne DeWitt.

Business_years

Not All

IT Companies

are the Same.

Get 30 Years of Expertise Immediately.

Fill in the form below and we will get to work right away.

CPU respects your privacy. We will never sell, rent or share to ANYONE. You can trust us.

Google Analytics Alternative