{"id":18336,"date":"2021-05-13T06:03:56","date_gmt":"2021-05-13T10:03:56","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/18336\/"},"modified":"2022-05-05T11:03:52","modified_gmt":"2022-05-05T07:03:52","slug":"5-things-that-you-must-update-asap","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/18336\/","title":{"rendered":"Five things to update ASAP"},"content":{"rendered":"<p>Rest assured, there is no global conspiracy to bug you with update notifications. As you may have noticed, unpatched software enables a large proportion of cyberattacks, which is why developers are constantly fixing vulnerabilities in their programs, and why you\u2019re constantly getting alerts about updates. Update the software, patch the vulnerabilities, foil the crooks.<\/p>\n<p>To learn more about the situation, we <a href=\"https:\/\/www.kaspersky.com\/blog\/device-updates-report\/\" target=\"_blank\" rel=\"noopener nofollow\">investigated user attitudes about updates in two dozen countries<\/a>. It turned out that every other person we surveyed is inclined to click \u201cRemind me later.\u201d That being the case, here\u2019s a handy list of the five most important types of software to update \u2014 the ones worth tearing yourself away from work or play.<\/p>\n<h2>1. Operating system<\/h2>\n<p>The operating system is the shell within which all programs on your computer or mobile device run, so security problems here can have very serious consequences. By exploiting a vulnerability in the operating system, cybercriminals can encrypt your data and demand ransom for it, mine cryptocurrency on your hardware, intercept your payment details, discover materials for extortion, and more.<\/p>\n<p>Operating system attacks are some of the most massive and destructive attacks out there. For example, through a vulnerability in Windows, WannaCry and NotPetya ransomware compromised hundreds of thousands of computers worldwide, leading to losses in the billions of dollars (read more about it in our <a href=\"https:\/\/www.kaspersky.com\/blog\/history-of-ransomware\/39203\/\" target=\"_blank\" rel=\"noopener nofollow\">history of ransomware post<\/a>). The Windows updates that addressed the vulnerability \u2014 the updates that would have thwarted the attacks \u2014 had long been available for download at the time of both WannaCry and NotPetya outbreaks.<\/p>\n<p>Tracing and fixing vulnerabilities in operating systems is an ongoing process, so updates should be regular. This applies to both computers and mobile devices.<\/p>\n<h2>2. Browser<\/h2>\n<p>Browsers, too, can give attackers access to a device. For example, cybercriminals can inject a malicious script into website code for <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/drive-by-attack\/\" target=\"_blank\" rel=\"noopener\">drive-by attacks<\/a>; victims need only open a Web page to pick up the malware.<\/p>\n<p>The creators of an <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/exploit\/\" target=\"_blank\" rel=\"noopener\">exploit<\/a> for Chrome carried out such an attack, <a href=\"https:\/\/www.kaspersky.com\/blog\/google-chrome-zeroday-wizardopium\/29126\/\" target=\"_blank\" rel=\"noopener nofollow\">using a browser vulnerability<\/a> to download a Trojan to victims\u2019 computers. Although Chrome\u2019s developers quickly released an update that patched the vulnerability, users who put off installing it remained easy prey.<\/p>\n<p>Don\u2019t forget about preinstalled browsers such as Safari or Edge. Even if you opened it only once to download Firefox or Chrome, it is still there. Some attacks harness programs that are simply in the system, regardless of whether you use them. Users of iOS and iPadOS versions older than 14.2\u00a0had to reckon with <a href=\"https:\/\/www.kaspersky.com\/blog\/update-ios-to-14-4-immediately\/38599\/\" target=\"_blank\" rel=\"noopener nofollow\">a bug in the Safari engine<\/a> that allowed attackers to run other programs.<\/p>\n<h2>3. Office productivity software<\/h2>\n<p>We are forever viewing and editing documents, so it should come as no surprise that cybercriminals often use bugs in the Microsoft Office and Adobe suites for attacks.<\/p>\n<p>For example, cybercriminals used a vulnerability <a href=\"https:\/\/threatpost.com\/necurs-based-dde-attacks-now-spreading-locky-ransomware\/128554\/\" target=\"_blank\" rel=\"nofollow noopener\">in Microsoft Word\u2019s DDE feature<\/a> to download Locky ransomware to victims\u2019 devices. A ransom demand followed, with a threat to destroy or publish confidential data. A short while later, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-disables-dde-feature-in-word-to-prevent-further-malware-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft released a patch<\/a>. The moral of the story: To keep your files, reputation, and money safe, update office software the moment you can.<\/p>\n<h2>4. Bank apps<\/h2>\n<p>Financial apps are among the juiciest targets for cybercriminals because a successful attack gets them directly inside the victim\u2019s wallet. Banks understand that, of course, and constantly update their apps to improve protection. The main thing is to install updates as soon as they become available.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n<h2>5. Antivirus software<\/h2>\n<p>It should go without saying that you also need to keep your security software up to date. New Trojans and viruses appear every single day; in the second half of 2020 alone, Kaspersky security products detected attacks by <a href=\"https:\/\/securelist.com\/it-threat-evolution-q2-2020-pc-statistics\/98292\/\" target=\"_blank\" rel=\"nofollow noopener\">80 million unique malicious objects<\/a>. To keep you safe from cyberinfections, your antivirus protection needs regular and timely updates.<\/p>\n<p>Your antivirus utility probably already updates itself by default, which is both convenient and security-centric, but just in case, check the settings to make sure. Both antivirus software and the malware databases on which it relies need regular, automatic updating.<\/p>\n<h2>Checklist<\/h2>\n<p>If you want your computer and smartphone to serve you and protect your personal data for a long time, it\u2019s important to consider protection at every level, including timely updates of software, in particular:<\/p>\n<ul>\n<li>Operating systems,<\/li>\n<li>Browsers (all of \u2019em),<\/li>\n<li>Office productivity software,<\/li>\n<li>Bank apps,<\/li>\n<li>And, of course, your <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">security solution<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h2>What to do while installing updates<\/h2>\n<p>One last thing. We are used to having digital devices at our beck and call, so a computer or smartphone being out of commission while installing a system update can be rather discombobulating.<\/p>\n<p>But there is more to life than technology, if you can believe it. Think about things you\u2019ve wanted to do, if you could only find the time. Breathe some fresh air? Call your parents or kids? Get some exercise? Click that \u201cUpdate\u201d button, and get yourself busy elsewhere. It\u2019s a win-win.<\/p>\n<p>To make exercise more interesting, we asked popular blogger, yoga teacher, and former elite gymnast <a href=\"https:\/\/www.instagram.com\/shona_vertue\/\" target=\"_blank\" rel=\"nofollow noopener\">Shona Vertue<\/a> to develop a special workout routine, one that\u2019s just the right length to keep the body active during a \u201cmedium-scale\u201d update of an operating system. The exercises are designed especially for infoworkers\u00a0\u2014 people with sedentary occupations are prone to posture problems. It\u2019s important to update yourself too, not just your software.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/-hrOA00lm_Y?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.<\/p>\n","protected":false},"author":2706,"featured_media":18337,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2088,105,109,1636,1268,2495,121,268,113],"class_list":{"0":"post-18336","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-tips","9":"tag-android","10":"tag-apps","11":"tag-browsers","12":"tag-exploits","13":"tag-international-day-for-universal-access-to-information","14":"tag-updates","15":"tag-vulnerabilities","16":"tag-windows"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/18336\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/5-things-that-you-must-update-asap\/22853\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/9110\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/24772\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/5-things-that-you-must-update-asap\/22765\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/5-things-that-you-must-update-asap\/25288\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/5-things-that-you-must-update-asap\/24671\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/5-things-that-you-must-update-asap\/30692\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/5-things-that-you-must-update-asap\/9640\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/39911\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/5-things-that-you-must-update-asap\/16933\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/5-things-that-you-must-update-asap\/17496\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/5-things-that-you-must-update-asap\/14829\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/5-things-that-you-must-update-asap\/26745\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/5-things-that-you-must-update-asap\/30699\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/5-things-that-you-must-update-asap\/27053\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/5-things-that-you-must-update-asap\/23890\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/5-things-that-you-must-update-asap\/29230\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/5-things-that-you-must-update-asap\/29027\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/updates\/","name":"updates"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18336"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18336\/revisions"}],"predecessor-version":[{"id":18833,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18336\/revisions\/18833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18337"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}