Gauging PC Security – Chrome The Worst of The Worst?

We here at SB doesn’t harbor the habit of writing about computer security, and rest assured that that subject will be left to others for the most part in the future too. This is one of the few and far between exceptions that we’ll indulge in, siply because this time, the pitfalls of security reporting is illustrated.

Chrome Tops Dirty Dozen

Bit9 has presented their “Dirty Dozen“, as usual, and the list is not surprising. Well, in so far as one would expect the most widely used types of programs to top the list. The list is comprised, technically, of all kinds of PC software, but looking at the list reveals an extreme percentage of web browsers and media players.

There’s a problem with Bit9’s list, however. They claim to list the “Dirty Dozen“, i.e. the programs that get in trouble the most, have the most weaknesses and vulnerabilities, and the ones that are the least safe to use. Now. Who can spot the elephant in the room?

Google Chrome tops the list. That’s surprising. In order to understand this, we need to look at the criteria by which this list is compiled. It takes into account only one real criteria, namely how many updates and patches have been issued for each piece of software.

Anyone with a little knowledge about software security knows that this isn’t a valid method for measuring how vulnerable a piece of software is. This article in ComputerWorld tells the story much better than we can, and anyone who’s interested should read it.

Those of you using Chrome out there – rest assured there is far less malicious code out there aimed at Chrome than for e.g. Adobe’s stuff. Also, Chrome was developed with security in mind, and by some of the best minds in the business.

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy