Unpatched vulnerabilities are usually undetected. If they were detected, they'd probably be patched.
On Fri, Apr 15, 2011 at 7:53 AM, Blue Boar <[email protected]> wrote: > Using unpatched vulns as justification for pushing patching? > > Ryan > > On 4/15/11 5:27 AM, Dan Kaminsky wrote: > > Can anyone find the circular definition in this story? It's amusingly > > subtle. > > > > On Fri, Apr 15, 2011 at 4:48 AM, Jeffrey Walton <[email protected] > > <mailto:[email protected]>> wrote: > > > > “.... Bradley Antis, vice president of technical strategy at Orange, > > Calif.-based M86 Security, [siad] the 15 software vulnerabilities > that > > were most often exploited in the second half of 2010 could have been > > stopped dead in their tracks — all already had been patched by their > > vendors.... The vulnerabilities continued to spread only because > > countless PC users didn’t bother to update their software, leaving > > enough unpatched machines on the Internet to allow the exploits to > > thrive." > > > > > http://www.securitynewsdaily.com/best-way-avoid-virus-infection-update-software-0685/ > > > > Apparently, Epsilon did not get the memo. > > > > _______________________________________________ > > Fun and Misc security discussion for OT posts. > > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > > Note: funsec is a public and open mailing list. > > > > > > > > > > _______________________________________________ > > Fun and Misc security discussion for OT posts. > > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > > Note: funsec is a public and open mailing list. > _______________________________________________ > Fun and Misc security discussion for OT posts. > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > Note: funsec is a public and open mailing list. >
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
