{"id":813,"date":"2007-10-29T10:27:17","date_gmt":"2007-10-29T14:27:17","guid":{"rendered":"http:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/"},"modified":"2007-10-29T10:27:17","modified_gmt":"2007-10-29T14:27:17","slug":"bit9-identifies-2007-639","status":"publish","type":"post","link":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/","title":{"rendered":"Bit9 Identifies 2007"},"content":{"rendered":"<p class=\"bwtextaligncenter\">       <em>List Reveals that Malicious Software is Not the Biggest Threat to        Enterprise IT; Even Common Applications Pose a Risk<\/em>     <\/p>\n<p class=\"bwtextaligncenter\">&nbsp;<\/p>\n<p>                        <!-- Body -->       <\/p>\n<p>CAMBRIDGE, Mass. (Business Wire EON) October 29, 2007 &#8212;        Bit9, Inc., a leading provider of <a href=\"http:\/\/www.bit9.com\/\">application        control<\/a> and <a href=\"http:\/\/www.bit9.com\/solutions\/stop-data-leakage.php\">device        control<\/a> solutions, today released its annual list of the top popular        applications with known vulnerabilities. Often running outside of IT<span>&rsquo;<\/span>s        knowledge or control, these popular applications can be difficult to        detect and remove. The list, published as a research brief entitled <span><a href=\"http:\/\/bit9.com\/2007vulnerableapps\">&ldquo;<\/a><\/span><a href=\"http:\/\/bit9.com\/2007vulnerableapps\">2007<span>&rsquo;<\/span>s        Popular Applications with Critical Vulnerabilities<span>&rdquo;<\/span><\/a>        was designed to help IT departments regain control over their desktop        environments.     <\/p>\n<p>&nbsp;                         Each application on the list has the following characteristics:          <\/p>\n<table border=\"0\" cellspacing=\"0\" class=\"bwtablebottommargin\" id=\"t5529669_2\">\n<tbody>\n<tr>\n<td id=\"t5529669_2_0_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\" colspan=\"2\">           1) Runs on Microsoft Windows.         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_1_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\" colspan=\"2\">           2) Is well-known in the consumer space and frequently downloaded by            individuals.         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_2_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\" colspan=\"2\">           3) Is not classified as malicious by enterprise IT organizations or            security vendors.         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_3_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\" colspan=\"2\">           4) Contains at least one critical vulnerability:         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_4_18200\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\">           &nbsp;         <\/td>\n<td id=\"t5529669_2_4_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\">           a. first reported in June 2006 or after,         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_5_18200\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\">&nbsp;<\/td>\n<td id=\"t5529669_2_5_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\">           b. registered in the U.S. National Institute of Standards and            Technology&#39;s (NIST) official vulnerability database at            http:\/\/nvd.nist.gov, and         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_6_18200\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\">&nbsp;<\/td>\n<td id=\"t5529669_2_6_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\">           c. with a severity rating of high (between 7.0-10.0) on the Common            Vulnerability Scoring System (CVSS).         <\/td>\n<\/tr>\n<tr>\n<td id=\"t5529669_2_7_225400\" class=\"bwcellpaddingleft0 bwverticalaligntop bwtextalignleft\" colspan=\"2\">\n<p class=\"bwcellparagraphmargin\">             5) Relies on the end user, rather than a central administrator, to              manually patch or upgrade the software to eliminate the              vulnerability, if such a patch exists.           <\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>       The first five of the top ten applications with known vulnerabilities        include:     <\/p>\n<p>       1. Yahoo Messenger 8.1.0.239 and earlier     <\/p>\n<p>       2. Apple QuickTime 7.2     <\/p>\n<p>       3. Mozilla Firefox 2.0.0.6     <\/p>\n<p>       4. Microsoft Windows Live (MSN) Messenger 7.0, 8.0     <\/p>\n<p>       5. EMC VMware Player (and other products) 2.0, 1.0.4     <\/p>\n<p>       <span>&ldquo;<\/span>These popular applications are frequently        downloaded to corporate desktops by users and can present unnecessary        security risk to IT and business operations,<span>&rdquo;<\/span>        said Brian Gladstein, Director of Product Marketing and author of the        research brief. <span>&ldquo;<\/span>The good news is that there        are several steps that IT departments can take to shield themselves and        fix these vulnerabilities in the application layer.<span>&rdquo;<\/span>     <\/p>\n<p>       To discover the other applications on the list and what to do about        them, please visit <a href=\"https:\/\/mailgw.bit9.com\/exchweb\/bin\/redir.asp?URL=http:\/\/bit9.com\/2007vulnerableapps\">http:\/\/bit9.com\/2007vulnerableapps<\/a>.        Readers will learn about a five-step approach recommended to control        vulnerable applications within the enterprise.     <\/p>\n<h5>       <strong>About Bit9, Inc.<\/strong>     <\/h5>\n<h5>       Bit9, Inc. is the leading provider of <a href=\"http:\/\/www.bit9.com\/\">application        control<\/a> and <a href=\"http:\/\/www.bit9.com\/solutions\/stop-data-leakage.php\">device        control<\/a> solutions. The company<span>&rsquo;<\/span>s        award-winning, patent-pending whitelisting technology prevents malicious        software and data leakage by centrally controlling which applications        and devices can and cannot operate.     <\/h5>\n<h5>       Unlike other application control and device control alternatives, Bit9        leverages the world<span>&rsquo;<\/span>s largest knowledgebase        of application intelligence to achieve business-friendly <a href=\"http:\/\/www.bit9.com\/products\/kbase.php\">whitelisting<\/a>,        enabling IT professionals to realize the highest levels of desktop        security, compliance, and manageability. Founded in 2002 by the founders        of Okena (acquired by Cisco Systems (NASDAQ: CSCO)) and headquartered in        Cambridge, Massachusetts, Bit9 is a privately held company. For more        information, visit <a href=\"http:\/\/www.bit9.com\/\">http:\/\/www.bit9.com<\/a>.     <\/h5>\n<p>&nbsp;<\/p>\n<h5><em>Bit9, Inc., Automatic Graylists, FileAdvisor, Find File, Parity, and        ParityCenter are trademarks or registered trademarks of Bit9, Inc. All        other names and trademarks are the property of their respective owners.<\/em><\/h5>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>List Reveals that Malicious Software is Not the Biggest Threat to Enterprise IT; Even Common Applications Pose a Risk &nbsp; CAMBRIDGE, Mass. (Business Wire EON) October 29, 2007 &#8212; Bit9, Inc., a leading provider of application control and device control solutions, today released its annual list of the top popular applications with known vulnerabilities. Often &#8230; <a title=\"Bit9 Identifies 2007\" class=\"read-more\" href=\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\" aria-label=\"Read more about Bit9 Identifies 2007\">Read more<\/a><\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39],"tags":[451,94,93],"class_list":["post-813","post","type-post","status-publish","format-standard","hentry","category-latest","tag-bit9-identifies-2007","tag-latest-news","tag-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bit9 Identifies 2007 - The Force Field Podcast<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bit9 Identifies 2007 - The Force Field Podcast\" \/>\n<meta property=\"og:description\" content=\"List Reveals that Malicious Software is Not the Biggest Threat to Enterprise IT; Even Common Applications Pose a Risk &nbsp; CAMBRIDGE, Mass. (Business Wire EON) October 29, 2007 &#8212; Bit9, Inc., a leading provider of application control and device control solutions, today released its annual list of the top popular applications with known vulnerabilities. Often ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\" \/>\n<meta property=\"og:site_name\" content=\"The Force Field Podcast\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-29T14:27:17+00:00\" \/>\n<meta name=\"author\" content=\"Rick\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\"},\"author\":{\"name\":\"Rick\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31\"},\"headline\":\"Bit9 Identifies 2007\",\"datePublished\":\"2007-10-29T14:27:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#organization\"},\"keywords\":[\"Bit9 Identifies 2007\",\"Latest News\",\"News\"],\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\",\"name\":\"Bit9 Identifies 2007 - The Force Field Podcast\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#website\"},\"datePublished\":\"2007-10-29T14:27:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.theforcefield.net\/podcast\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bit9 Identifies 2007\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#website\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/\",\"name\":\"The Force Field Podcast\",\"description\":\"A podcast for and about IT Service Providers\",\"publisher\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.theforcefield.net\/podcast\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#organization\",\"name\":\"The Force Field Podcast\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png\",\"contentUrl\":\"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png\",\"width\":990,\"height\":100,\"caption\":\"The Force Field Podcast\"},\"image\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31\",\"name\":\"Rick\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/author\/savoiaco2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bit9 Identifies 2007 - The Force Field Podcast","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/","og_locale":"en_US","og_type":"article","og_title":"Bit9 Identifies 2007 - The Force Field Podcast","og_description":"List Reveals that Malicious Software is Not the Biggest Threat to Enterprise IT; Even Common Applications Pose a Risk &nbsp; CAMBRIDGE, Mass. (Business Wire EON) October 29, 2007 &#8212; Bit9, Inc., a leading provider of application control and device control solutions, today released its annual list of the top popular applications with known vulnerabilities. Often ... Read more","og_url":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/","og_site_name":"The Force Field Podcast","article_published_time":"2007-10-29T14:27:17+00:00","author":"Rick","twitter_misc":{"Written by":"Rick","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#article","isPartOf":{"@id":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/"},"author":{"name":"Rick","@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31"},"headline":"Bit9 Identifies 2007","datePublished":"2007-10-29T14:27:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#organization"},"keywords":["Bit9 Identifies 2007","Latest News","News"],"articleSection":["Latest"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/","url":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/","name":"Bit9 Identifies 2007 - The Force Field Podcast","isPartOf":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#website"},"datePublished":"2007-10-29T14:27:17+00:00","breadcrumb":{"@id":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.theforcefield.net\/podcast\/bit9-identifies-2007-639\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.theforcefield.net\/podcast\/"},{"@type":"ListItem","position":2,"name":"Bit9 Identifies 2007"}]},{"@type":"WebSite","@id":"https:\/\/www.theforcefield.net\/podcast\/#website","url":"https:\/\/www.theforcefield.net\/podcast\/","name":"The Force Field Podcast","description":"A podcast for and about IT Service Providers","publisher":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.theforcefield.net\/podcast\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.theforcefield.net\/podcast\/#organization","name":"The Force Field Podcast","url":"https:\/\/www.theforcefield.net\/podcast\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/","url":"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png","contentUrl":"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png","width":990,"height":100,"caption":"The Force Field Podcast"},"image":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31","name":"Rick","url":"https:\/\/www.theforcefield.net\/podcast\/author\/savoiaco2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/posts\/813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/comments?post=813"}],"version-history":[{"count":0,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/posts\/813\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/media?parent=813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/categories?post=813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/tags?post=813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}