Digital Edition

SYS-CON.TV
Vulnerability "Top Twenty"
Here's what invites cyber-crime, according to the experts

Here are the top 20 "Achilles Heels" in today's computers from the point of view of hackers.

According to the BBC, the list includes loopholes found in both Windows and Unix/Linux software.

1. Web servers and services

2. Work station service

3. Windows remote access services

4. Microsoft SQL server

5. Windows authentication

6. Web browsers

7. File-sharing applications

8. LSAS

9. E-mail programs

10. Instant messaging

11. Bind domain name system

12. Web server

13.Authentication

14.Version control systems

15. Mail transport services

16.Simple Network Management Protocol (SNMP)

17.Open secure sockets layer (SSL)

18.Misconfiguration of enterprise services

19.Databases

20. Kernel (ANI)

"It's a first things first list," explained Alan Paller, head of the Sans Institute, a non-profit group which trains and certifies computer security professionals. "It can be very helpful for people that are trying to fix their vulnerabilities," he added.

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-fo...
Organizations planning enterprise data center consolidation and modernization projects are faced wit...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often ...
Fact: storage performance problems have only gotten more complicated, as applications not only have ...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are ...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems ...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savin...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear...
While some developers care passionately about how data centers and clouds are architected, for most,...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in developm...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are rep...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming ou...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news an...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held Novemb...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO an...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018,...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As au...