. "Hackers count on people to use outdated versions of such applications as browsers or PDF readers, so most virus and malware threats exploit security holes that newer versions fix." . . . .