Bonum Certa Men Certa

Microsoft Cannot Offer Security on the Web, Either

Predator



Summary: Vultures keep circling not just Microsoft Windows but just about anything from the company, which failed to comprehend security

THERE are companies that increasingly decide to rely on online services, which they sometimes refer to as 'the cloud'. There is a false assumption about security though. First of all, if one accesses these services from a Windows-running PC, one is not secure. In China, for example, hackers can access Windows source code, which was never written to be inspected in this way (and many security experts have not had the time to find errors in it prior to release). On the server side too Microsoft is failing based on the latest news:



1. Microsoft BPOS configuration screw up causes data disclosure

Customers of Microsoft's Business Productivity Online Suite—a cloud-based suite including Exchange, SharePoint, LiveMeeting, and Office Communicator—may have had certain data leaked after a configuration error left their contact information exposed.

The configuration problem left information in customers' Offline Address Books exposed to other customers. The Offline Address Book is an Exchange feature that allows Outlook users to download a copy of all the e-mail addresses and mailing list aliases that an organization uses, so that they can be used even when disconnected from Exchange. It's e-mail addresses on those lists that could have been made available.


2. Microsoft BPOS cloud service hit with data breach

Company data belonging to customers of Microsoft's hosted business suite BPOS has been accessed and downloaded by other users of the software.

The issue affected the Offline Address Book of customers of the Business Productivity Online Suite (BPOS) Standard suite.

Microsoft confirmed the data breach to Webwereld, a Dutch IDG publication.


This is far from being the first BPOS cockup [1, 2, 3] and putting that together with the botnet problem on the client side, there's no reason to choose Microsoft over GNU/Linux with Google as host, for example. The European politicians recently began talking about Windows botnets, bringing up problems like Conficker and Stuxnet: [via Glyn Moody]

Inside the EU, damages from this botnet were reported in France, the UK and Germany. French fighter planes were unable to take off after military computers were infected by Conficker in January 2009. The German army reported in February 2009 that parts of its computer network were infected by Conficker, making the websites of the German army, and the Defence ministry unreachable and preventing them from being updated by their administrators. Certain IT services, including e-mails, were unavailable for weeks to the UK Ministry of Defence personnel in January/February 2009 after they were infected by the Conficker botnet.

In the last few days experts at international level have launched an alert for a new type of malicious computer warm called Stuxnet that is infecting a high number of power plants, pipelines and factories and could be used to control plant operations remotely. If confirmed, this would be the first case of a highly sophisticated botnet aimed at industrial targets, a development experts don't hesitate to define ''the first directed cyber weapon''. Botnets like Stuxnet could give wrong information and orders to industrial plants and operate sabotage at several levels, causing severe damages.


Incidentally, there's advice from Wayne Borean ("My Christmas gift to Windows Users" he calls it) which goes under the heading "Computer Security Suggestions For Microsoft Windows Users" and moving away from Windows is high up on the list. For those who don't know yet, for Windows administrators it may have been a tough holiday, as usual (this happens every year at this time) because "Microsoft confirm[ed] critical un-patched Internet Explorer CSS vulnerability" just before Christmas:

The flaw could allow malicious users to run unauthorised code remotely inside the iexplore.exe process. Proof-of-concept code is currently available that exploits the vulnerability. The code bypasses ASLR and DEP security protections in Windows. Security firm Vupen warned of the vulnerability earlier this month.


Here is more about the zero-day exploit: [via]

A remote code execution vulnerability against Internet Explorer was announced recently, and a proof-of-concept exploit has already been added to the Metasploit products.


And finally, consider the following batch of news:

i. Malware Posing as Fake Desktop Utilities Instead of Phony Antivirus

Recently, researchers at GFI Software have noticed an increase in the number of fake security software scams purporting to be disk utilities that fix disk errors. Instead of listing Trojans, these security alerts pretend to find disk fragmentation or file system integrity problems.


ii. Bummed-out users give anti-virus bloatware the boot

One in four users turned off their anti-virus protection in response to performance problems after they installed security software, according to a survey by security software firm Avira.

The poll of users of the German anti-virus outfit, which like AVG and Avast offers free security software to consumers, also found that more than three in five (62.8 per cent) users had tried multiple anti-virus products over the last year.


The problem is not just Windows; it's Microsoft products in general.

Recent Techrights' Posts

Sponsored by Linux Foundation
All the pages are full of 'Linux' Foundation ads that are not about Linux
It's Hard to Dispose or Get Rid of Swasticars Now
'Memecars' only sell as long as people have a 'belief' in them
 
Links 13/03/2025: COVID-19 Legacies and "Modern" Cars as Spying Machines on Wheels
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 12, 2025
IRC logs for Wednesday, March 12, 2025
The Fall of the Open Source Initiative (OSI): Microsoft-Sponsored OSI is Probably Not Even the Real Steward of the Open Source Definition, It's More Like an Identity Thief at This Point (Like "FSFE", a Microsoft-Sponsored Imposter of FSF)
As we'll show later, many people (even inside OSI) are very angry at the OSI right now
Gemini Links 12/03/2025: Cataloging Books, Ramen, and MElon
Links for the day
Links 12/03/2025: Anti-Union Actions and New Efforts at Truce/Ceasefire in Ukraine
Links for the day
CodeWeavers Ads Weaved by LLM Slop at BetaNews
How much of this was even touched by a human being?
Springtime Plans
We currently have two long series underway
In Australia, iOS Estimated to be Bigger Than or Equal to Windows
Not even counting macOS
Brett Wilson LLP Does Not Deny Microsoft or Another "Third Party" Secretly Funds the SLAPPs Against Techrights, Bankrolling Despicable People Who Deserve Criticism
Writing about crime is not a crime
Gemini Links 12/03/2025: LLM Slop Lacks a Future, Wordle Clone Comes to Gemini Protocol
Links for the day
Using FUD That Blames "Linux" for Typos, Turning It Into LLM Slop That Blames "Linux" for Typos
It is probably the "leader" at LLM slop (fake 'articles') about "Linux"
Links 12/03/2025: Big Cuts to US Education and Science (e.g. NOAA)
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, March 11, 2025
IRC logs for Tuesday, March 11, 2025
Crossbow murders: prevention, missed opportunities
Reprinted with permission from Daniel Pocock
This yt-dlp Bug Report Shows Us That the Future of YouTube is DRM and It's Time to Leave (yt-dlp Should Also Leave Microsoft GitHub, Which Censors YouTube Downloaders)
GAFAM traps aren't "free hosting"; they herd us all into a world of tollbooths and locks, surveillance and planned obsolescence (you own nothing, you only rent)
Ukraine Didn't Take Twitter/X Down, Microsoft or Windows Likely Did
There are many debunkings (to likely false accusations), but won't that just be another example of Windows TCO, exacerbated externally in the form of Windows botnets?
The Fall of the Open Source Initiative (OSI): Worse Than What the Media Has Focused on, Losing Sight of Who Owns and Runs the OSI
Members' dues are less than 3% of the income; where does the 97+ percent come from other than Microsoft?
Apple Seems to Have Run Out of Things to Boast About After Apple Vision Pro Failed Spectacularly
With "Apple Intelligence", Apple has finally named a product after what target customers lack
Slopwatch: Reckless FUD and Machine-Generated Spam from LinuxSecurity.com, cybersecuritynews.com, and gbhackers.com (Google Boosts LLM Slop About "Linux")
Google and so-called 'Google News' continue to yield anti-Linux misinformation
Gemini Links 11/03/2025: 'Chainsaw Politicians' and Proprietary Software Hell
Links for the day
Links 11/03/2025: Covid-19 5 Years On and Violence in Syria
Links for the day
Links 11/03/2025: NASA Besieged and "DOGE Has Become What It Claimed To Destroy"
Links for the day
Fresh IBM Layoffs Reported in Europe and North America, Jobs Allegedly Moved to South Asia (Low Salaries)
As usual, IBM does not talk about this
Illuminating Injustice is Critical When Reckless Microsofters and Law Firms Try to Silence Reporters of Violence Against Women
I want to clarify that I'm well within my right (and not running afoul of any rules) by explaining what goes on here
EPO Central Staff Committee: "The Strategy of the Office Lacks Transparency and Cannot be Understood"
Microsoft and the EPO violate data protection laws
Microsoft Has Not Much Left to Show Investors, Shares Fall Almost 20%
It's not even clear how Microsoft makes money anymore
Links 11/03/2025: Spring and Misfin Server
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 10, 2025
IRC logs for Monday, March 10, 2025