The most popular and comprehensive Open Source ECM platform
Vulnerabilities and Exploits. They’re on the rise. Writing software that is “correct” and “unhackable” is a very difficult task.
Ori Sasson, founder of cyber-intelligence firm S2T, said that “because apps are ‘constantly updated’ to introduce new features, while updates can fix known defects and vulnerabilities, they can insert new unknown ones. It is ‘literally impossible’ to prove the absence of a vulnerability in a ‘non-trivial application'”.
Tom Kellermann, chief cybersecurity officer at cybersecurity firm Carbon Black, said that “the unfortunate reality is that most messaging apps have vulnerabilities that can be exploited by sophisticated cyber spies. No messaging service is bulletproof.”
In the first quarter of 2019, a new record in the number of vulnerabilities reported over a three month period was reached, according to Risk Based Security. And about 40 percent of those have no ready fixes. What is even more troubling is that often the vulnerability is reported by researchers but the software vendor responsible is not immediately notified.
As Harry Swartout wrote, “in the world of digital security there is unsafe, and there is safer, but no one is hack-proof. Jennifer Lawrence and other celebs may have been protecting their private images, but hackers have a seemingly bottomless bag of tricks.”