troubleshooting Question

client side outdated software query.

Avatar of Pau Lo
Pau Lo asked on
4 Comments4 Solutions79 ViewsLast Modified:
How specifically do attacks which target outdated software on a windows device, e.g. something assigned to an employee for daily duties such as a laptop/desktop, actually occur? Do they always require some form of user mistake, or does the very fact the software is outdated pose a problem regardless of tricking a user into some form of action?

I was thinking of things such as iTunes/adobe/java/none MS browsers as was suggested in another post as some of the higher risk 3rd party apps in terms of targets for hackers. I was just trying to identify some scenarios where those kinds of things could be exploited perhaps from someone external to the company.
Join our community to see this answer!
Unlock 4 Answers and 4 Comments.
Start Free Trial
Learn from the best

Network and collaborate with thousands of CTOs, CISOs, and IT Pros rooting for you and your success.

Andrew Hancock - VMware vExpert
See if this solution works for you by signing up for a 7 day free trial.
Unlock 4 Answers and 4 Comments.
Try for 7 days

”The time we save is the biggest benefit of E-E to our team. What could take multiple guys 2 hours or more each to find is accessed in around 15 minutes on Experts Exchange.

-Mike Kapnisakis, Warner Bros