Google Chrome has highest number of vulnerabilities

But the high level is down to its efficient detection system

security key on keyboard

Google Chrome has the highest level of detected vulnerabilities, while Avant haa the second highest, according to research.

Security detection company Secunia exposed 162 Chrome threats in October alone, which is quite a hike from its August number of 64. Avant claimed 159, while the third in line was iTunes with 83.

However, the firm said the reason the number is so high is because Google has the most advanced detection system in the industry, meaning it's probably more secure than others that have lower readings.

Kasper Lindgaard, Secunia's director of research and security, said: "It is almost always Google themselves who disclose the vulnerabilities," meaning it's safer to use "due to the vendor proactively hunting down and fixing vulnerabilities before anyone knows about them".

Not only does Google have a stringent in-house vulnerability detection system, it also offers attractive rewards to those outsiders who uncover risks, encouraging white hat hackers and security researchers to report any vulnerabilities they detect in return for a bounty.

Additionally, the browser uses a number of third party libraries which "may or may not make Google Chrome vulnerable too," according to Lindgaard.

The number of vulnerabilities detected has risen 40 per cent year-on-year with a total 1,841 vulnerabilities in the 20 most vulnerable programs. IBM was the worst-performing company with a high number of flaws across its suite of products.

Yesterday, it was announced Google was going to take a further step in warning users of potential harmful sites by marking those that use the 'http' protocol rather than 'https' as insecure.

"The goal of this proposal is to more clearly display to users that HTTP provides no data security," members of the Chrome Security Team said in a blog post.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
CEOs of Facebook, Twitter and Google face Senate hearing
Policy & legislation

CEOs of Facebook, Twitter and Google face Senate hearing

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020