You can’t be invulnerable, but you can be well protected

Jump to navigation Jump to search

(Publication) Google search: [1]

You can’t be invulnerable, but you can be well protected
Botnet/malware group
Exploit kits
Distribution vector
Operation/Working group
Vulnerability CVE-2015-0310, CVE-2015-0311, CVE-2015-1701, CVE-2015-0313, CVE-2015-0336, CVE-2015-0359, CVE-2015-3090, CVE-2015-3104, CVE-2015-3105, CVE-2015-3113, CVE-2015-5119, CVE-2015-5122, CVE-2015-5560, CVE-2015-7645, CVE-2014-6332, CVE-2015-2419, CVE-2012-0158
Date 2015 / 2015-12-23
Editor/Conference Kaspersky Securelist
Link (Archive copy)
Author Vyacheslav Zakorzhevsky
Type Blogpost


Software vulnerabilities are one of those problems that potentially affect all users. A vulnerability is a fault in a program’s implementation that can be used by attackers to gain unauthorized access to data, inject malicious code or put a system out of operation. In most cases, vulnerabilities arise from a lack of attention to fine details at the design stage rather than programming errors. Sometimes a system can seem virtually invulnerable at the design stage, but then, at some point, a new technology arises and hackers prove that the system can be successfully attacked. A notable example is DES – a symmetric-key encryption algorithm developed in 1975, which was considered bulletproof at the time. However, in 1990 it was successfully broken in 39 days using an enormous computer network. A supercomputer built in 1998 succeeded in breaking DES in less than three days.


   editor = {Kaspersky Securelist},
   author = {Vyacheslav Zakorzhevsky},
   title = {You can’t be invulnerable, but you can be well protected},
   date = {23},
   month = Dec,
   year = {2015},
   howpublished = {\url{}},