Vulnerability Analysis
The New Front in the War on Cyber Crime: Exploits

With computer users becoming increasingly savvy to ways virus makers try to trick them into clicking or taking other action that initiates the virus infection, modern virus writers have come up with a more sinister new attack method known as an “exploit.”

An exploit is so named because it exploits security holes (known as “vulnerabilities”) in out-of-date, commonly used software — such as Adobe Reader, Java, Internet browsers and more — to sneak viruses into computes. What makes these exploits so dangerous is that once a virus finds a hole, it can enter the computer without the user doing anything. If you land on a compromised web site, an exploit could infect your computer through a hole in the software without you clicking anything on the site.

The study above is a sample of 143,000 computers in April 2013. This study concludes that 90% of computers have one or more vulnerabilities, which makes them susceptible to exploit attack.

Legitimate software makers move quickly to plug these security holes as soon as they discover them, but the patches are only helpful if they are downloaded onto your computer. PC Matic adds security to your computer by automatically updating exploit-targeted software to the latest version, reducing your risk.

Is your computer vulnerable to an exploit? Read more on how to find out.