EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.15.11

When Windows Kills

Posted in Australia, Microsoft, Security, Windows at 12:51 pm by Dr. Roy Schestowitz

Ambulance

Summary: Australian emergency services had their own emergency (a downtime of over a day) due to Windows viruses; a lot more evidence from the news shows the uniqueness of Windows as far as insecurity goes

OVER the years we have gathered examples where Microsoft’s shoddy security cost lives, e.g. [1, 2, 3]. At one point we called it “Death by Microsoft Windows” and it appears to be happening again in Australia, whose government has shared a bed with Microsoft for many years (the OOXML fiasco is an example of that, but it is a month old by now [1, 2, 3, 4, 5]). According to IDG:

Computers which co-ordinate NSW’s ambulances are back online in three of the state’s regions after a major virus forced staff to shut them down for more than 24 hours.

The virus crept into the Ambulance Service of NSW’s dispatch system at 1pm (AEDT) on Saturday, prompting staff to co-ordinate paramedics by telephone and handwritten notes.

“Major virus,” eh? What do they mean by “major”? Viruses in this context are not physical beings. Surely a better term would be “Windows virus,” not “major virus,” right? “Windows, presumably,” writes Glyn Moody, “is this so wise when lives depend on it?”

The EFF points out that, based on Bruce Schneier’s analysis, the Microsoft updates are a potential flaw and there is a mention of “SCADA” too (covered in [1, 2, 3, 4, 5]).

We know the market pressure approach can work. Once Microsoft saw that the market would (at least threaten to) make purchasing decisions on the basis of security, we suddenly got the Secure Windows Initiative and Trustworthy Computing. A key security technique is keeping the heat on vendors.

There is also an operational problem. To get a handle on the state of security of important infrastructure, try a Google search for [ scada security ]. It turns up alarming reports of basic security problems in some of our nation’s most important systems. (“SCADA” stands for “supervisory control and data acquisition”, and is used generally to refer to industrial control systems for things like water purification, electricity, manufacturing, and so on.)

Somewhat related to this is the shocking news that the very notorious HBGary created Windows rootkits like “MAGENTA”, based on some new leaks:

In the new emails released by Anonymous we discover that HBGary Inc. may have been working on the development of a new type of Windows rootkit that was undetectable and almost impossible to remove.

There is also more about Stuxnet, which we last mentioned last night.

The Stuxnet worm repeatedly attacked five industrial plants inside Iran over a 10-month period, according to new data collected by researchers from antivirus firm Symantec.

Three of the undisclosed organizations were targeted once, one was hit twice and one was targeted three times, members of Symantec’s Security Response Team wrote in the report (PDF), which updates findings first released in September. The attacks took place in 12,000 separate infections in 2009 and 2010 and weren’t discovered until July.

Also in the news right now:

A report issued today warns IT professionals that cybercriminals are changing their tactics and, as a result, predicts there will be fresh banking trojans arriving in the wild.

The bi-annual report from M86 Security says that IT managers need to redouble their efforts to patch their IT systems, as next-generation malware is now on the way.

These new types of malware, says the company behind the report, are likely to include application code that takes advantage of social networking service users.

Notice the avoidance of words like “Microsoft” and “Windows”. It suits them well, it does not inform the readers though. Microsoft is one of the major causes of SPAM, owing to the number of botnets that get created by capitalising on Microsoft flaws. Nonetheless, the culprit from Redmond does some new marketing around E-mail ‘surveys’ that are probably intended to exploit Valentine’s Day. Business as usual, right?

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. The EFF Back to Tackling Software Patents, Not Just Patent Trolls

    Electronic Frontier Foundation lawyers start targeting large companies that exploit patents for intimidation and extortion, not just patent trolling



  2. Microsoft Wants to Devour the Competition (Linux), Devour People's Data

    Refuting the "new Microsoft" propaganda and some ludicrous concept that Microsoft is now "playing nice"



  3. Benoît Battistelli Thinks 'President' is Above the Law, Decides to Ignore the Court's Ruling

    Staff of the EPO is given yet more reasons to protest tomorrow at the British Consulate, for the so-called 'President' of the EPO reminds everyone of the very raison d'être for the protest -- a vain disregard for the rule of law



  4. Links 24/2/2015: Xfce 4.12 a Week Away, GNOME 3.16 Previewed

    Links for the day



  5. Links 23/2/2015: Ubuntu Kylin 14.04.2 LTS, Cinnamon 2.6 Previews

    Links for the day



  6. IRC Proceedings: February 8th - February 21st, 2015





  7. The EPO's Sham 'Internal Investigation' of EPO Vice-President Željko Topić's Affairs

    The EPO never investigated the Željko Topić affair, it only pretends to have investigated (one small aspect, i.e. cherry-picking) using a Benoît Battistelli-controlled group



  8. Links 21/2/2015: GNOME 3.15.90, Google Wins Android Lawsuit

    Links for the day



  9. Microsoft AstroTurfing War on GNU/Linux is Still Going On, But Hidden Better, Uses API as Instrument of Lock-in

    The corruptible press continues to describe blatant attacks (Embrace, Extend, Extinguish) against GNU/Linux and Free software as Microsoft 'embracing' Open Source



  10. Lenovo's Superfish Scandal is Spyware on Top of Spyware (Microsoft Windows), the Problem is Inherently Proprietary Software

    Shifting focus to the root problem, which is neither Lenovo nor its laptops but the non-free programs installed on hardware



  11. Benoît Battistelli Once Again Threatens EPO Staff That 'Dares' to Protest, Battistelli Exploits Terror Attacks to Pretend to Respect Free Speech

    The European Patent Office (EPO) President, Benoît Battistelli, reportedly started threatening -- as before -- staff that decides to exercise the right to assemble and protest against abuses, including the abuses of President Battistelli himself



  12. Links 20/2/2015: Android Studio v1.1, GDB 7.9

    Links for the day



  13. Links 20/2/2015: Bloomberg Joins Linux Foundation, ClearOS Community 6.6.0

    Links for the day



  14. The Chartered Institute of Patent Attorneys Slams the European Patent Office for Structural Failings

    An important letter which we overlooked while writing yesterday's 4 articles about the European Patent Office (EPO); yet another key stakeholder complains



  15. Links 19/2/2015: Hewlett-Packard on Cumulus Linux, Previews of GNOME 3.16 Beta

    Links for the day



  16. Techrights Under Attack Again, Shortly After Important EPO Articles

    Techrights highlights a pattern that is months old; Site faces availability issues shortly after reports about the European Patent Office and its abuses



  17. EPO Staff Protests Against Benoît Battistelli’s Lowering of Patents Quality (Scope Expansion and Software Patents for Profit)

    A protest in Munich in less than 6 days will target Mr. Sean Dennehey, who has helped Battistelli cover up his abuses and crush legitimate critics, whom he deemed illegal opposition as if the EPO is an authoritarian regime as opposed to a public service which taxpayers are reluctantly (but forcibly) funding



  18. Breaking: European Patent Office Sued by Its Own Staff in The Hague, Must Unblock Staff's Voices

    The crooked management of the European Patent Office (EPO) gets in legal trouble after repeated attempts to cover up abuses and suppress criticism



  19. Željko Topić's History in SIPO Leaves a Legacy of Alleged DZIV Vehicles (Bribes), Authorship Abuses, and Intimidation Against Reporters

    Another deep look at Željko Topić's background in Croatia, preceding his very notorious appointment to the EPO where he now serves as Benoît Battistelli's most controversial attack dog



  20. The Old Obsession With Patent Trolls Continues to Distract From Debate About Software Patenting

    A roundup of recent coverage about monopolies on algorithms in the United States



  21. Links 19/2/2015: 64-bit ARM Linux, Chinese New Year

    Links for the day



  22. Links 18/2/2015: Linux Report, FlightGear 3.4

    Links for the day



  23. EPO Scandals: The Story So Far

    An overview of articles about mischief, misconduct and breach of laws at the EPO



  24. Links 17/2/2015: TripleO, Pivotal

    Links for the day



  25. Links 17/2/2015: SystemD 219, Frugalware 2.0 (Rigel) Released

    Links for the day



  26. Željko Peratović Slammed for Whitewashing Željko Topić After Publishing Important Piece on Behalf of Key Sources

    Response from Ivan Kabalin to Zeljko Peratovic's so-called "apology" which is both mysterious and seemingly inadequate as it does nothing to actually explain what was wrong (if anything)



  27. Benoît Battistelli Has Made Oversight of European Patent Office Absolutely Impossible





  28. Microsoft Already Killed Nokia, Don't Let It Kill Android Players Too

    Microsoft's strategy against Android mirrors the company's evil strategy that derailed MeeGo and Nokia



  29. Intel Continues to Attack Software Freedom Through UEFI

    The Trojan horse that Microsoft uses to cement its monopoly on desktops and laptops (making it hard or impossible to install and run GNU/Linux) is also being misused to block Coreboot



  30. Links 16/2/2015: Netrunner 15, Bridge Linux

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts