Bonum Certa Men Certa

Microsoft Refuses to Fix Known Security Vulnerabilities for Years, Anti-Virus (AV) Software Turns Useless

Guard in Prague



Summary: Shocking new revelations about Microsoft's patronising attitude, which leaves customers vulnerable and unable to control their computers

Microsoft Spurned Researcher Collective is a new group of disgruntled experts whom Microsoft mistreated after they had helped Microsoft discover serious bugs in its software. According to this news item, Microsoft's attitude towards security vulnerabilities is absolutely appalling and Microsoft should be slammed for it.



In October 2006, security researcher H.D. Moore discovered a serious problem with the way applications running on Windows display rich text content.

He reported the vulnerability to Microsoft and nearly four years later it's still not fixed, despite the fact that it could be exploited to run malicious code on a PC and take control of it.

Unfortunately, this is not an isolated incident. According to the Zero Day Initiative, which serves as a broker between security researchers who find flaws and software companies who need to fix them, there are 122 outstanding vulnerabilities that have been reported to vendors and which have not been patched yet. The oldest on the list was reported to IBM in May 2007 and more than 30 of the outstanding vulnerabilities are older than a year.


So it only took like what...? Just years? There are other examples like this one -- several of which we covered here before. Such utter negligence [1, 2, 3] deserves scrutiny if not legal action, for reasons we explained before. By not fixing known problems Microsoft can carry on faking numbers to create a false perception of security. "Pressure mounts for a swifter response to vulnerabilities," says this new report from The H and a security news site now argues that "AV vendors detect on average 19% of malware attacks" (that's not much better than no AV software at all).

The data used for this study were collected and analyzed between April 20, 2010 and April 22, 2010, resulting in an overall total data set of approximately 1,708 confirmed malware files. The files were then run through the latest release of the top desktop AV solutions upon initial detection and again every six hours for one month to determine their detection and lag rates.


No wonder one in two Windows PCs is believed to be a Windows zombie PC.

Recent Techrights' Posts

3 Days Ago Over at Tux Machines...
GNU/Linux news
Most of This Month Will Deal With EPO Scandals
A timeline of sorts
Links 01/11/2025: Microsoft Distributes Malware Again, Radio Free Asia Shut Down by Dictator
Links for the day
 
Facebook's Debt Leaps to Over 51 Billion Dollars
A lot of this is a bubble, aside from the bubble the media irresponsibly dubs "AI"
Still Catching Up, Daily Links a Top Priority
Readers who have additional information about the EPO can send it along to us
Links 01/11/2025: "Americans Are Defaulting on Car Loans at an Alarming Rate" While Many Left to Starve (SNAP)
Links for the day
Gemini Links 01/11/2025: FIFO and Gemini Age Survey
Links for the day
Why Does German Media Protect the EPO From Accountability for Cocaine?
Can we trust such media to properly inform the public?
Links 01/11/2025: Microsoft Azure Goes Offline Again
Links for the day
November is Here, Anniversary Party This Coming Friday
Expect this site to return to its normal publication pace either by tomorrow or Monday
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, October 31, 2025
IRC logs for Friday, October 31, 2025
Gemini Links 01/11/2025: Synergetic Disinformation and Software Maintenance
Links for the day
IRC Proceedings: Thursday, October 30, 2025
IRC logs for Thursday, October 30, 2025
IRC Proceedings: Wednesday, October 29, 2025
IRC logs for Wednesday, October 29, 2025