{"id":7531,"date":"2012-10-17T17:37:25","date_gmt":"2012-10-17T22:37:25","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=7531"},"modified":"2013-04-18T17:22:41","modified_gmt":"2013-04-18T22:22:41","slug":"hackers-exploit-zero-day-bugs-for-10-months-on-average-before-theyre-exposed","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=7531","title":{"rendered":"Hackers Exploit &#8216;Zero-Day&#8217; Bugs For 10 Months On Average Before They&#8217;re Exposed"},"content":{"rendered":"<blockquote><p>One aspect of zero-day exploits use that\u2019s made them tough to track and count has been how closely targeted they are. Unlike the mass malware infections that typically infect many thousands of machines using known vulnerabilties, the majority of the exploits in Symantec\u2019s study only affected a handful of machines\u2013All but four of the exploits infected less than 100 targets, and four were found on only one computer.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/10\/16\/hackers-exploit-software-bugs-for-10-months-on-average-before-theyre-fixed\/\">Hackers Exploit &#8216;Zero-Day&#8217; Bugs For 10 Months On Average Before They&#8217;re Exposed &#8211; Forbes<\/a>.<\/p>\n<blockquote><p>Unsurprisingly, the study shows that hackers target common software like Microsoft Word, Flash and Adobe Reader. Sixteen of the 18 zero-day exploits discovered and analyzed in the study affected Microsoft and Adobe software.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>One aspect of zero-day exploits use that\u2019s made them tough to track and count has been how closely targeted they are. Unlike the mass malware infections that typically infect many thousands of machines using known vulnerabilties, the majority of the &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=7531\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[923,427,698,426],"class_list":["post-7531","post","type-post","status-publish","format-standard","hentry","category-pc-issues","tag-0day","tag-exploit","tag-security-research","tag-symantec"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/7531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7531"}],"version-history":[{"count":3,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/7531\/revisions"}],"predecessor-version":[{"id":9890,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/7531\/revisions\/9890"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7531"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}