For the purposes of this answer, I am interpreting the question as focused on what has changed about running Windows XP on April 7, 2014 vs on April 9, 2014. To put another way, I am not going to speak to the myriad of advantages and disadvantages that were true on both days, but rather what specifically changed about Windows XP security on April 8th.
So, from that perspective, lack of patching capability is the security issue with XP post April 8th, and it's a major one. No, running "good" anti-virus software and a third-party firewall won't make up for it. Not by a long shot.
Security is a multi-faceted problem. "Being Secure" involves using encrypted communication channels (https), running active monitoring/detection software (anti-virus/malware), only downloading software from trusted sources, validating signatures on downloaded applications, avoiding notoriously weak software, and updating/patching software promptly.
All of these practices and products taken together can be called security hygiene and, in the case of Windows XP, you can continue to practice all these things except for one: patching, but it won't help.
Why Patching Matters
Therein lies the first and most critical problem. Aggressive patching is the absolute most effective practice of all, and this is why:
- Anti-virus fails at alarming rates, 40% according to this study. Plenty of others abound. Detection is still mostly based on fixed signatures. Remixing old exploits to evade detection is trivial.
- Firewalls do not stop what users let in. PDF, Flash, and Java: the Most Dangerous File Types are all invited right through the firewall. Unless the firewall is blocking The Internet, it's not going to help.
Running the latest anti-virus and firewall just doesn't do much. That's not to say they aren't effective in combination with all the above hygiene, and anti-virus will eventually detect some exploits as they age, but even then trivial repackaging will evade detection and the underlying exploits will still work. Patching is the foundation of a good defense. Without patching, everything else is just gravy. The vast majority of malware depends on unpatched software to succeed:
How the most common cyber exploits could be prevented (2011):
One of the more disturbing, although not surprising, findings was that the top 15 vulnerabilities being exploited by observed attacks were all well-known and had patches available, some of them for years. The Office Web Components Active Script Execution vulnerability, No. 2 on the hit list, has been patched since 2002. The top vulnerability, in Microsoft’s Internet Explorer RDS ActiveX, has been patched since 2006.
Interesting Analysis on Patching and Attacks:
“In this supplemental analysis, zero-day exploitation accounted for about 0.12 percent of all exploit activity in 1H11, reaching a peak of 0.37 percent in June.”
“Of the attacks attributed to exploits in the 1H11 MSRT data, less than half of them targeted vulnerabilities disclosed within the previous year, and none targeted vulnerabilities that were zero-day during the first half of 2011.”
In other words, the vast majority of successful exploits are only possible because people did not apply patches when they became available. Even now, the majority of the successful Java exploits are against vulnerabilities that have been patched, users are not updating. I could post dozens more research papers and articles but, the point is, when vulnerabilities are known and patches are not applied, that is where the damage increasingly comes from. Malware, like any software, grows and spreads over time. Patches inoculate against old malware but, if patches never come, the environment is getting increasingly toxic by the day, and there is no cure to be had.
Without patches, zero-day vulnerabilities are never closed, they are effectively "zero-day" forever. As each new vulnerability is found, malware authors can spin new minor variations to avoid signature detection, and the OS will always be vulnerable. So Windows XP will become less and less secure over time. In practice, this will look a lot like what we see in the above GCN report among the 40% of XP users in 2011 who hadn't even installed patches from 2002 (so, post-April 8th, that will be 100% by definition). Compounding the problem will be the fact that malware authors are already focusing on XP again, knowing that anything they find will remain valuable and exploitable long term.
In the age of always/frequently-on, always-connected devices, aggressive and frequent patching is a base requirement of any OS.
"Extremely dangerous" is way strong. Why? Will my PC explode if I use Windows XP? Actually, if anything happens to the system, I can just reinstall Windows, so "extremely" is not appropriate here. – Wais Kamal – 2018-06-10T00:13:39.883
11
The answer to this question is long and involved. true understanding requires a great deal of study and experience. Thats why most folks read opinions and advice from those who have developed the knowledge you question. Since you do not want to trust what the entire industry has been saying since 2007, there is no answer we could give you that would satisfy. short answer, you are wrong in almost every way you can be wrong. start here: http://nakedsecurity.sophos.com/2013/10/31/has-microsoft-just-proved-why-you-should-upgrade-from-xp/
– Frank Thomas – 2014-04-08T15:26:46.6103@FrankThomas It is not about thrust. I am just questioning the media. I'm not asking for a detailed 160 page PDF issuing every issue and targeted for security experts. I'm asking for a simple and clear explanation and perhaps simple counter measures regular users can understand. That would make life easier for a regular user. – Madmenyo – 2014-04-08T15:30:35.363
4XP was built on a sandstone foundation, and over time ants have worn holes throughout it. there are too many holes to patch, so you tear down the house and build it again on an improved foundation. vista for all its flaws in userland had a significantly more securable kernel, and will stand up better against previously unknown exploits. there is no simple or clear set of countermeasures you can take when you don’t know the form of the exploit (since it hasn't happened yet). No one can tell you what threats XP will face tommorow, only what its facing today. – Frank Thomas – 2014-04-08T15:36:22.680
Safe in what environment and from what threats? As currently worded, this is an extremely broad question. – Jason – 2014-04-08T17:47:14.510
3Safety is illusion. – Jet – 2014-04-08T18:01:35.093
5I think using Windows XP even with updates is extremely dangerous – VL-80 – 2014-04-08T19:19:29.237
1Since, if i may say so, this is a interesting question and definitely has interesting and useful answers. Could this question be un-holded? I understand the topic is broad but i cannot think off a way to cut it in pieces and ask multiple questions about this subject. Yet this proved to be a popular question with some good answers and deserves to be re-opened imho. – Madmenyo – 2014-04-10T16:01:06.000