Six years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Thousands of organizations relied on that list, and on the expanded Top-20 lists that followed in succeeding years, to prioritize their efforts so they could close the most dangerous holes first. The vulnerable services that led to worms like Blaster, Slammer, and Code Red have been on SANS Top20 lists.The SANS Top-20 2006 list is not “cumulative.” We have listed only critical vulnerabilities from the past year or so. If you have not patched your systems for a length of time, it is highly recommended that you patch the vulnerabilities listed in the Top-20 2005 list as well as those in the 2006 list.
If you have not patched your systems for a length of time, it is highly recommended that you patch the vulnerabilities listed in the Top-20 2005 list as well as those in the 2006 list.It's for sure that any one who hasn't patched their system for any length of time hasn't listened to anything preached here on the forum. :(
- Internet scanning data shows that there are still systems facing the Internet that are not patched for vulnerabilities being exploited widely. I, for one, will give up working on this project when I no longer see any Blaster or Slammer worm events triggering on any IDS/IPS in the customer networks.
- Even if all the patches have been applied, there are still zero-days to deal with! This year’s list includes a list of defenses for zero-days.
Hi FwF,
This comes to show that you have to secure your system to avoid the consequences of the flood of new flaws. Important rules are, use one admin account only for downloading all the downloads and patches. Use a second account for your normal internet activities that you run as normal user (restricted rights, an safexp installed (run only those services you need also with minimal rights, use an alternate browser, if you need IE for a reason of rendering page have it fully updated, and secure it.
Use one resident av solution and some additional non-resident scanners, use anti-spyware solutions (ad-aware free, spybot s&d, and spyware blaster (this latter only install on a malware free machine), use ewido micro, a-squared against the eventual trojan infection. Use in-browser protection in your browser, that is NoScript, Anti-phishing (Netcraft), DrWeb’s anti-virus hyperlink checker, a good adware blocking solution, stealther (delete cache, browser history, cookies, header referals etc.) , use crapcleaner on your machine to get rid of crap and unnecessary temporary files, check your zones and host files once in a while, start reading this forum to get malware-wise, and this is the best advice we can give you. It is possible to secure a windows environment but it needs some attitude and knowledge to do this, and the will to adopt these tactics,
polonus