It’s the classic case of the hunter being hunted. The numerous security appliances and devices that claim to protect the customers from malicious activities online are prone to attacks themselves, as they have a number of vulnerabilities to deal with.
In its new study titled, “(In)Security in Security Products,” iViZ Security examined various categories of security tools, antivirus solutions, firewalls and VPN security tools. The company found that these applications are in need of protection themselves before they will be able to guard other computers.
In fact, the study states these security products are no better than the normal products when it comes to protecting themselves from online threats. The detailed report also offers a list of security products with the highest number of vulnerabilities discovered; incidentally, topping the list was Clam AV, followed by Norton Anti-Virus. Cisco (News - Alert) tops the list for security companies.
The report stated that anti-virus products reported the maximum number of vulnerabilities followed by firewalls and VPN. Also, Cisco products had the maximum number of vulnerabilities reported, followed by Symantec (News - Alert) and Computer Associates.
Commenting on vulnerability trends, Jitendra Chauhan, who headed the team that conducted the study, said, “Although there is a growing movement to disclose vulnerabilities, many of them still remain a secret. There is an underground business where such vulnerability information is traded for various reasons linked to cyber-warfare or cyber-crimes.”
Recently, the company released a vendor neutral research report focusing on web browser security. The report titled, "Security Comparison of Browsers: An Independent Report", is the culmination of detailed analysis carried out by iViZ research labs. The research covered all important browsers: Google Chrome, Microsoft (News - Alert) Internet Explorer, Mozilla Firefox, Apple Safari and Opera. Apart from doing financial transactions over the Web, almost everybody uses browser for web-surfing and social-networking.
Edited by Brooke Neuman