EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

05.20.11

It’s Not a Virus If the User Needs to Actually Install It

Posted in Apple, GNU/Linux, Microsoft, Security, Vista 7, Windows at 7:23 am by Dr. Roy Schestowitz

Virus

Summary: Rebuttal to security FUD from the Microsoft crowd amid attack on the US Energy Research Lab, which got cracked because of Windows

GOOGLE abandons Windows due to security reasons. It’s really quite simple. But if enough Microsoft people (e.g. former staff) manage to enter news sites, then “news” becomes just agenda-filled propaganda. That’s what happened in the BBC, which we call the MSBBC. Not too surprisingly, Microsoft's Bought Bot and MSBBC, which loves to post FUD about Android every time someone is able to do something to break it (we covered just one such example recently even though there are more), are at it again. In order to fight the perception that Windows is insecure by design (which it is, even by Microsoft’s own admission) they try to paint other platforms as “inseucre”, by improperly naming malware “virus” or something along those lines. This usually requires that the user should be actually be installing it (not drive-by), in which case the software is granted permission to do exactly what it was designed to do.

SJVN writes a rebuttal to the Bought Bot by noting that “One in fourteen Internet downloads is Windows malware” (not the same as viruses):

Yes. It’s true. For the first time, Mac users have a significant malware problem. But, hey, it could be worse. You could be running Windows. After all, Microsoft, not some third-party anti-virus company trying to drum up business, has just admitted that based on analysis gained from IE 9 use, “1 out of every 14 programs downloaded is later confirmed as malware.”

If I may quote from Matthew 7:5, the King James Bible, “First cast out the beam out of thine own eye; and then shalt thou see clearly to cast out the mote out of thy brother’s eye.”

Window PCs has far, far more malware trouble than Macs, and I can’t resist mentioning that after in twenty-years of Linux, we’ve not seen a real-world example of Linux malware–not counting the Android malware mess. Ironically, these latest appalling Windows malware numbers are shared in a Microsoft blog about how well SmartScreen Application Reputation is working in IE9.

There is another new pattern of FUD at the moment, where a weakness that affects virtually all phone platforms is ascribed only to Android. Linux is winning, so it is becoming a prime target for FUD. One of our reader supplies this recent link on “Wild Android Growth”. It says that “100 million Android devices have been sold, more than Apple… 36 OEMs, 215 carriers, and 450K developers push Android/Linux, 310 different devices sold in 110 countries, 400K activations daily, 4.6 per second, 200K available applications exist, and 4.5 billion installations of applications have been done, an average of 45 per device.”

Suffice to say, there is also patent as well as copyright FUD against Android and it comes from someone whom Microsoft Florian has been repeatedly interacting with recently. He used to work for Microsoft. “I think it’s more likely not about press for himself for himself as for press on the issue,” writes Pamela Jones, “preparatory to more hijinks filing of bogo-complaints against a Microsoft competitor.” It’s like mercenaries galore.

In other news, “U.S. Energy Research Lab Still Recovering From Internet Explorer Exploit,” says this report:

The Department of Energy’s largest science and research lab in Tennessee is still recovering from a sophisticated attack from hackers intent on stealing information from the lab in early April.

The attack left the lab in a communications limbo for two days as technicians dealt with its aftermath.

“Most of the staff are back up, and the business functions are performing as usual,” said Barbara Penland, the Oak Ridge National Laboratory’s director of communications. “But as you can imagine, when we were trying to get everything back up in a hurry, there were some shortcuts taken, and now the IT folks are rebuilding things in the background, and building some things that will make us more secure.”

“US nuclear materials lab, Oak Ridge, and RSA done in by Windows and IE attack in April,” explains a contributor of ours. “The only common “Advanced Persistent Threat” shared by the two is Windows,” he adds, quoting:

To deal with the attack, Oak Ridge lab’s technicians had shut down access to its e-mail systems and some of its servers for more than 48 hours. They found that it was an attack that relied on a combination of social engineering and an unknown security hole in Microsoft’s Internet Explorer browser. … the attack is noteworthy because it was clearly an attempt to steal information from a facility that is at the heart of America’s materials, national security and energy research. …

The characteristics of the this latest attack also appear similar to those used in the widely-publicized SecurID phishing attack, which compromised the computer security company RSA’s widely-used product. In the RSA attack, a malicious Flash object in a scam Excel file was used to infect recipients’ computers with malicious computer code.

Incidentally, he add that “NSA tells people to buy Vista/Windows 7 or OSX instead of moving to free software. They probably justified the omission based on perceived OS prevalence but most of the measures recommended are useless and real security is easier to find in freedom than in jail.”

We wrote about the NSA issue quite recently [1, 2]. To the FBI, for example, malware is not a bad thing, it's just business as usual. To them, insecurity at the user level is an advantage. Security means “securing those in power from the population” when it comes to secret agencies.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Microsoft's Latest Anti-Linux Strategy: Deleting Android From Android Devices

    Microsoft pretends that it is 'embracing Android' whilst actively trying to delete Android from Android devices



  2. Only Months After Microsoft's Ramji Enters the Linux Foundation Microsoft Gradually Joins Him

    Sam Ramji is doing to Linux what Stephen Elop did to Nokia



  3. Microsoft Wants to Remove (or Deprecate) PuTTY From Windows and Replace It With Proprietary Microsoft Software

    The most prominent NSA partner wants to 'contribute' to OpenSSH, one of the thorns in the side of spies all around the world



  4. EPO Corruption Compared to FIFA Corruption While 'Control Risks' Helps EPO Hide/Suppress Evidence of Corruption; Calls on German Authorities to Crack Down on Both

    As German authorities express eagerness to crack down on corruption calls emerge for action against the Munich-based EPO, where Battistelli acts like an out-of-control autocrat who tries to silence the media and conceal information about Topić's and his own abuses



  5. When Patent Lawyers Attack the Messengers for Stopping Software Patents, Ignoring Patent Law's New Post-Alice Reality

    Analysis of recent articles from patent lawyers, highlighting their bias and disregard for facts in this system which has become increasingly intolerant toward software patents



  6. Links 3/6/2015: More Ubuntu Phones, Qt Releases

    Links for the day



  7. Links 2/6/2015: Black Lab Linux Releases, Krita Fundraiser

    Links for the day



  8. IRC Proceedings: May 17th - May 30th, 2015

    Many IRC logs



  9. Sharp Drop in Microsoft Patents, But Not in Patent Assaults, Coordinated Attacks on Android/Linux, and Googlebombing

    Using patent blackmail (antithetical to the original goal of patents) and other forms of blackmail, Microsoft is desperately trying to crush GNU/Linux and Android, all while Windows 'sales' fall and investors lose confidence



  10. EPO Reluctantly (and Privately) Confirms Giving Public Money for Military-connected 'Control Risks' to Spy on Journalists and Their Sources While Techrights is Under Fresh DDOS Attacks

    The EPO President -- or anyone who is referred to as 'appointing authority' -- finds himself even deeper in a scandal as he silently attacks the very same people whom he pretends to negotiate with by contracting spies from London (to maliciously target British journalists)



  11. Links 1/6/2015: wattOS R9, Tanglu 3

    Links for the day



  12. Supreme Failure: With SCOTUS Approval of Patent Trolls and a Push by Justice Department to Reinforce Copyright on APIs (at SCOTUS Level) the Future Looks Gloomy

    The patent system goes wild in terms of scope, the nature of the plaintiff (merely purchasing patents), and the extension of patents to monopolies on named APIs (by virtue of deranged interpretation of copyright law)



  13. McAfee Associates Free Software and Anonymity With Crime

    Insecurity firm McAfee, whose record on Free software is appalling (it is Windows-centric for its business), continues years of tradition by slinging mud at Tor



  14. The EPO Still Wastes Public Money on Publicity Stunts and 'Reputation Management' Campaigns

    The European Patent Office (EPO) is misusing public funds to manufacture self-congratulatory publicity for itself whilst attacking those who write negative commentary



  15. The Lessons of Stuxnet: Never Use Microsoft Windows

    Windows is sufficiently 'NSA-compatible' for remote compromise and physical damage (sabotage) to highly sensitive, high-risk equipment



  16. Links 30/5/2015: Wine 1.7.44, Berry Linux 1.20

    Links for the day



  17. White House Intervention Harms Android and Every Software Developer on the Planet

    US Solicitor General Donald Verrilli urges the Supreme Court (SCOTUS) to let APIs be covered by copyrights, rendering almost every program a potential copyright violation



  18. Microsoft Lobbying in India Shoots Down or At Least Weakens Free/Libre Software Policy

    Microsoft's covert efforts (lobbying with the help of public partners like NASSCOM) to eliminate an India-leaning software policy in India is finally paying off



  19. Propaganda Mode for UPC Agreement Whilst EPO Increasingly Grants Patents on Software

    In order to make the Unitary Patent a reality (towards a 'no place to hide' patent approach) misleading claims are being made



  20. Patents Are Not Source Code

    Ford is once again misleading regarding Open Source, mischievously associating a patent pledge with Open Source



  21. Links 29/5/2015: ALT Linux 7.0.5, Google I/O 2015

    Links for the day



  22. Links 28/5/2015: SourceForge Hijack, RIP Marco Pesenti Gritti

    Links for the day



  23. Censorship on Reddit Has Gotten (Condé) Nasty and Silent, Even Actively Silenced

    Condé Nast has turned Reddit into a platform of censorship after the acquisition



  24. The Supreme Court of the United States Helps Patent Trolls

    In an unforeseen kind of ruling, the same court which slapped down a lot of software patents last year is now legitimising the actions of a patent troll



  25. Patent Lawyers Fight Hard for the Future of Software Patents

    Media that is dominated by patent lawyers and targets an audience of patent lawyers refuses to accept the post-Alice reality



  26. Fortune Glorifies Patent Troll Jay Walker (Patent Utility)

    Jay Walker, a patent troll, creates a Web-based trolling/'licensing' service and the corporate media helps him



  27. Stealing Android's Thunder, Making It All About Apple and Microsoft During Google I/O

    Misleading articles and conjoined media/analyst attacks on Android coincide with Google's event where major Android announcements are being made



  28. British Government May be a Step Closer to GNU/Linux (on the Desktops, Not Just Servers)

    The British government stops paying the criminal company that blackmails its members, thereby increasing the possibility of complete escape from proprietary software



  29. Microsoft's Patent Allies LG and Sony Agree to Put Microsoft Inside Android

    LG and Sony (of Rockstar Consortium) follow Samsung and Dell in Microsoft's campaign to turn Android into 'Microsoft Android' using patents-induced pressure/leverage



  30. Yet Another Major Security Deficiency in UEFI

    UEFI is inherently insecure, more so than the alternatives which it strives to replace, including Free/libre ones


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts