Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319


Microsoft may finally have some encouraging news for Windows 10 users

Image Description

More and more users around the world are upgrading to Windows 10, but many are still sticking with older software editions, new data has shown.

The latest figures from NetMarketShare have shown that Windows 10 is now being used on nearly two-thirds of Windows devices as Microsoft's push continues to bear fruit

Overall, Windows 10 was found to be running 59.37% of devices, making it far and away the most popular edition of the operating system.

Windows 10 vs Windows 7

Windows boasts 87.03% of the desktop and laptop market share, however, older versions of Microsoft's operating system are still in regular use. 

In particular, Windows 7, despite having reached its end of support in January 2020, is still being used on 23.34% of PCs out there according to NetMarketShare.

Even worse, the venerable Windows XP still boasts 0.82% of all Windows users, meaning millions of devices could be at risk of attack due to running the outdated and unprotected software.

It seems that many users remain reluctant to make the upgrade to Windows 10 given Microsoft’s unfortunate recent habit of apparently breaking bits of its newest OS on a regular basis. 

Microsoft will now be keen to ensure Windows 10 growth continues throughout 2020 as the operating system now seems to have recovered from the fall it experienced in April 2020, where the OS dropped from 57.34% the previous month down to 56%.

Elsewhere, Linux use continued to rise, reaching 3.57% after climbing above the 3% marker for the first time in June 2020, Apple's macOS share fell again to just 8.95% (down from 9.68% the previous month), and Chrome OS (used by Google's Chromebook devices) stayed fairly solid at 0.39% market share.


06 Aug 2020



Other Blog

  • NZXT’s custom-built PCs could be your best way of swiftly getting an Nvidia RTX 3000 GPU

    If you’re thinking of buying a new PC anyway, this could be a great way to beat scalper prices on Ampere GPUs.

    Read More
  • This devious new malware targets your DVR

    A new variant of the BotenaGo malware that exclusively targets DVR for security camera systems has been spotted in the wild by security researchers.

    For those unfamiliar, BotenaGo is a relatively new malware written in Google’s open source Golang programming language. While it was originally used to target IoT devices in an effort to create botnets, BotenaGo’s source code was leaked online back in October of last year.

    Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

    In the time since, cybercriminals have developed several new variants of the malware while also improving the original by adding new exploits to target millions of connected devices.

    Now though, Nozomi Networks Labs has discovered a new variant that appears to be derived from the leaked source code. However, the sample analyzed by the firm’s security researchers exclusively targets Lilin security camera DVR devices which is why it has been dubbed “Lillin scanner”.

    Lillin BotenaGo variant

    Another thing that sets Lillin scanner apart from the original BotenaGo malware is that the variant is currently undetected by every antivirus engine on VirusTotal.

    According to a report from BleepingComputer, this could be because the malware variant’s authors have removed all of the exploits found in the original BotenaGo. Instead, they’ve written the malware to only focus on Lilin DVRs by exploiting a two-year-old critical remote code execution vulnerability. Casting a smaller net for potential targets makes sense in this case as there are still a significant number of unpatched Lilin DVR devices in the wild.

    An additional key difference between BotenaGo and Lillin scanner is that the new malware variant leverages an external mass-scanning tool to create lists of the IP addresses of vulnerable devices. Nozomi’s researchers also highlight the fact in their blog post on the matter that the cybercriminals behind Lillin scanner have specifically programmed it to avoid infecting IP addresses that belong to the US Department of Defense (DOD), the US Postal Service (USPS), General Electric, Hewlett Packard and other businesses.

    Once a vulnerable device is infected by Lillin scanner, Mirai payloads are then downloaded and executed on it. Still though, this new BotenaGo variant isn’t such a massive threat as it only targets devices from a specific manufacturer.

    Via BleepingComputer

    Read More
  • Bitcoin price hits new record high after Tesla confirms $1.5bn purchase

    Tesla has made a large purchase of bitcoin to diversify its assets as it plans to accept the cryptocurrency for payments.

    Read More
  • Google announces it might have created physics-breaking 'Time Crystals'

    Google says it may have produced a 'Time Crystal', a quantum system that violates one of the most fundamental laws of physics.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us