None. But are there any exploits that attack Windows right now without user interaction? Just turning on a fully patched Win7 system and having it connected to the Internet (not behind a hardware firewall). I know there was a time with WinXP that just doing that would result in an infection just by pressing the power button. I think it was through the RAW sockets (If I recall correctly).
None from just turning Windows on. But there have been some fairly recently (Nov. 2010) and consistently across time (Kneber) for Windows Live Messenger that affected fully patch Vista/7. In the most recent incidence, I do believe that Messenger was not the most current version.
This UAC bypass was released to the public prior to being patched and remained unpatch until at least 2010-12-17. This could easily be used to cause privilege escalation after exploitation of various client side softwares.
Recently, the security of Windows in the domain of malware is much improved but in reference to average users that click on anything, possibly pirate software, and etc the following does apply:
You can answer this by asking yourself the following question:
Name one piece of malware for OS X that does not require user interaction (meaning password authentication) to infect and propagate?
This excludes trojans, but Mac OS X only has four relevant unsuccessful trojans and 3 of them are detected by XProtect included in 10.6 by default.
So, 1 undetected trojan for OS X vs hundreds maybe thousands of undetected pieces of malware for Windows given that no AV software has 100% detection rates and the volume of Windows malware is going faster each year.
Sorry, I realize I modified my previous post after you had responded. I had not refreshed my browser.
Last edited: