In its latest security report, Microsoft also says hackers look for flaws in applications to infect computers Fake security software programs along with attacks using vulnerabilities in applications continued to pester Internet users in the last half of 2008, according to Microsoft’s latest security report.The bogus security software programs often offer a free scan that falsely says a user’s computer is infected. If installed, the programs are ineffective against malicious software. Security experts have theorized that those behind the programs reap lucrative profits.Microsoft detected two Trojan horse programs, Win32/FakeXPA and Win32/FakeSecSen, masquerading as security software on more than 3 million computers in the last six months of 2008, according to the company’s Security Intelligence Report, published every six months.With the Washington state attorney general, Microsoft launched eight lawsuits in September 2008 aimed at tracking down those responsible for perpetrating the scams. Software vulnerabilities dropped 3 percent in the last half of 2008 compared to the first six months of the year, the report said. But more than half of all of the vulnerabilities were considered “high severity” under the Common Vulnerability Scoring System (CVSS). Also, more than half of those problems were considered pretty easy to exploit, putting Internet users at greater risk.Microsoft software contained six of the top 10 browser-based vulnerabilities used by hackers against computers running Windows XP. Hackers also continued to try to exploit older vulnerabilities in Microsoft applications. The most frequently exploited flaw in Microsoft Office, CVE-2006-2492, was patched more than two years ago yet is still targeted by 91.3 percent of attacks against the software suite.In 2008, Microsoft released a total of 78 security bulletins that fixed 155 vulnerabilities, which represented a 16.8 percent increase over 2007, Microsoft said.Attackers also looked to exploit problems in other third-party software from vendors such as Adobe, whose PDF (Portable Document Format) reader is widely used. Adobe has had several security vulnerabilities over the last year in its Reader product. Microsoft said it saw more than double the number of attacks aimed at PDF in July 2008 as it did in the whole six months prior.Vulnerabilities in Microsoft Office file formats and PDFs are golden for hackers, since people can often be persuaded to open the documents using social engineering tricks via e-mail. Microsoft said more than 97 percent of e-mail messages are unwanted because they either contain malicious attachments, are spam or promote a phishing site.The U.S. remained the No. 1 country for hosting phishing sites, the report said. The state of Texas hosted the most of all, according to Microsoft. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe