From: Poutnik on
In article <4BC5C0CC.B483A1E4(a)Guy.com>, Virus(a)Guy.com says...
>
> Poutnik wrote:
>
> > > > But support and updates for W2K ends in July 2010....
> > >
> > > And the emergence of new threats against IE6 (sp1) will also end
> > > in July 2010 because so too will examination and public
> > > disclosure of new vulnerabilities.
> >
> > Aside of publicly dislosed vulnerabilities, there are plenty
> > of non publicly disclosed vulnerabilities.
>
> The exploits that you see widely circulated and used are the result of
> public disclosure. This disclosure frequently happens within days of,
> or at the same time as the patch or fix being made available by the
> vendor.
>
> Hackers and "exploiters" usually do not conduct their own vulnerability
> research, but instead rely on public disclosure and then quickly code
> their exploits for mass distribution.
>

There is known fact many vulnerabilities are inherited,
often through even several generations of the products, including IE.

If there is still widely used,
not anymore supported old version of SW,
sharing vulnerability with current versions,
they are ideal hacker target.

Linux and different UNIX flavors
would be definitely more vulnerable than Windows,
because there is much more published vulnerabilities for them.

But they are not.



--
Poutnik
The best depends on how the best is defined.
First  |  Prev  | 
Pages: 1 2 3 4 5
Prev: Malwarebytes' Error..UPDATE
Next: Ping: Dustin