How are systems being exploited today (OS vulnerability vs malicious email attachments) ?

Giganews Newsgroups
Subject: How are systems being exploited today (OS vulnerability vs malicious email attachments) ?
Posted by:  Virus Guy (Viru…@Guy. com)
Date: Tue, 01 Apr 2014

Is there any hard data out there regarding how the typical Windoze PC
becomes infected with a trojan / backdoor ?

I'm thinking specifically in the case of XP, where the tech-press and
the commercial interests of Micro$oft and it's ecosystem of companies
are prone to spreading FUD about the pending status of XP, as if it's
about to be stripped naked and exposed to the full force of hackers - to
essentially be in the same horribly vulnerable state it was in back when
it wasn't ready to be given to consumers back in October 2001.

How does the typical XP box (sitting behind a NAT router, running the
native XP incoming firewall) become infected these days?

Is there hard data that the OS itself is vulnerable?

If you subtract all cases where users don't click on malicious email
attachments, and if they keep their browser, flash, java, acrobat
software updated, then going forward how does XP present itself as
vulnerable?

Bonus question:

What was the last version of IE that runs on XP, and is that version
still being supported by virtue of support updates supplied for Vista or
Windoze 7?

Replies