Most malware tries to compromise your systems by using a known vulnerability that the operating system maker has already patched.

Click for the full article. This excerpt was posted by IFTTT through Pocket.