Matt Miller, his security engineer Microsoft Security Response Center, said that zero-day attacks are only a few times effective compared to the latest versions of Windows.
Miller also said that the protection of up-to-date systems is due to the mitigation that has been added by Microsoft last. Still has analyzed the attempts of these attacks between years 2015-2019, since Microsoft released its most powerful paper to date, Windows 10.
In one of his most recent speeches at the conference security of BlueHat in Israel last February, Miller shared the statistics he had. These proved that Windows vulnerabilities were more likely to be exploited as zero-day before the company prevent an update be released code or months later, after companies fail to make repairs.
Of course, we can not overlook that, according to recent statistics, the hackers will move to earlier versions of Windows to detect and attack defects.
Miller's partners also announced plans to replace the two major Windows languages, C and C ++ so far, with the Rust programming language. This is because, according to studies, Rust is a security-oriented programming language that reduces memory-related bugs.