Good Afternoon All,
The basic issue seems to be whether or not the new feature Software Updater is an unwanted stealth intrusion or a useful additional feature for those who are a bit negligent in keeping other vital applications up-to-date.
On the Software Updater page, there is a button on the bottom-right
Activate automatic updates.
I’ve very recently upgraded all my W7 and XP computers to Avast 8, so am as yet unsure how software updates are installed.
If I
don’t click on this button, will I receive a pop-up informing me that a third-party program now has an available update, or will I have to check manually every-so-often?
If I
do click this button, will available updates be thereafter installed automatically? If so, will I then receive a pop-up informing me that a program has been updated?
In the real world, the large majority of users are negligent in their security monitoring. I occasionally fix other peoples’ computers, and often find that their Adobe Reader, Java, Flash, etc. are operating on older vulnerable versions.
I don’t denigrate or patronise them for this. Most have busy demanding lives, and their priorities are not exclusively centred on their computer’s security settings – others please note.
I’m beginning to consider that this updater might be a useful addition for such people who are er um “negligent”, as it could act as a one-stop-shop to monitor other applications – see below.
Finally – I have no issues with Avast 8 Free. It now sits well with my networked W7 & XP computers and my ZA firewalls and does not perceptibly slow down bootup or normal running. I have been using Avast for years, and am grateful that they provide such an excellent
FREE program.
http://www.securelist.com/en/analysis/204792231/IT_Threat_Evolution_Q1_2012Vulnerable applications targeted by malicious usersSince the majority of attacks via the Internet are performed with exploits that target vulnerabilities in software to breach security and execute malicious code without the user’s knowledge, it is logical to ask which programs are usually targeted by exploits. It is strongly recommended to update these programs in the first instance, and subsequently set automatic updates in future.
Adobe Acrobat Reader - 40%
Java - 26%
Android Root - 8%
Adobe Flash - 3%
Others - 24%
Applications with vulnerabilities targeted by online exploits in the first quarter of 2012 According to the diagram, 66% of exploit-based attacks target just two programs – Adobe Reader and Java.
Roughly one in four attacks on Java target the vulnerability CVE-2011-3544, which was popular among cybercriminals over the whole quarter: it was used for the distribution of the Hlux bot, the Carberp Trojan and a ‘fileless’ bot.
scrumdown