Insecurity Through Obscurity
- Dr. Roy Schestowitz
- 2009-04-09 11:34:47 UTC
- Modified: 2009-04-09 11:34:47 UTC
Summary: Windows renders E-mail chaotic and the U.S. electrical grid gets cracked
Nothing beats a brand-new explanation from
Microsoft itself about the impact of its poor security skills, which
continue to this date.
More than 97% of all e-mails sent over the net are unwanted, according to a Microsoft security report.
This report from Microsoft probably neglects to mention that
the vast majority of SPAM is spewed from Microsoft Windows botnets. And speaking of poor security (inherent in secret code), here is another
new report, among many similar ones.
Chinese and Russian cyberspies have hacked into the U.S. electrical grid and have left behind software that could be used to interfere with the system, a report said Wednesday.
The original report
comes from the Wall Street Journal (thus requiring subscription), but the message is clear. This facility runs a legacy proprietary system that experts have warned about for quite some time.
Here ends another daily lesson about security and obscurity. They have a reverse relationship. There is
evidence that shows GNU/Linux to be more secure.
⬆
"Two security researchers have developed a new technique that essentially bypasses all of the memory protection safeguards in the Windows Vista operating system..."
--Dennis Fisher
"It is no exaggeration to say that the national security is also implicated by the efforts of hackers to break into computing networks."
--Jim Allchin, Microsoft
Comments
Balrog
2009-04-09 17:29:27
Looks like InfoWorld broke the link. See http://web.archive.org/web/20080209124930/http://www.infoworld.com/articles/hn/xml/02/09/05/020905hnmssecure.html for the article.
Charles Oliver
2009-04-10 00:57:42
One of the stand out quotes from that page was this:
"Microsoft has also been employing new tools developed by Microsoft Research that are designed to detect errors in code during the development process, Valentine said."
I remember reading (possibly on el reg) about MS big upping another bug hunting tool just recently. It seems they've had a lot of these. I wonder why they don't seem to help?
Roy Schestowitz
2009-04-10 01:11:43
Charles Oliver
2009-04-10 02:21:57
Yggdrasil
2009-04-09 16:39:01
http://www.geekzone.co.nz/foobar/6229
The articles you link make a few things clear that you did not mention. Many of these bot net machines were infected by users who either opened email attachments or were using outdated software that had been patched sometimes years in advance. Even the security vulnerability in the US power grid software was made public in May of last year:
http://www.coresecurity.com/content/wonderware
You would expect us to believe that if Wonderware were to open source (there fore not obscure, but in awareness, not numbers) it's own software, then the operators of these power plants would have taken the time to read through the entire source code themselves and find the vulnerability long before it ever become a problem. You simply expect too much in a world where even when others take the time to find and make patches available, the end users sit on their backside. The only alternative would be to apply forced updates, but then your run into larger problems with people paranoid about their systems doing things they did not approve of. Computers security as as much a human problem as it is a software problem, but it's so much easier to simply blame one large "evil" corporation.
Roy Schestowitz
2009-04-09 17:15:26
Not only Microsoft is mentioned here.
I disagree. An operating system is a very large program or a combination of many.
Really?
“Forty percent of servers run Windows, 60 percent run Linux...”
--Steve Ballmer (September 2008)
There were rebuttals to it. With secure Linux installations there are also sandboxes and it's hard to compromise entire machines.
What about PowerPoint users right now (still unpatchable)? Or many unpatched flaws that required no user intervention? Where are attachments dispatched from in the first place? Windows botnets maybe?
Yes, already noted in my post.
This misses the core of the argument. Non-free software procrastinates fixes due to lack of a sense of urgency. The code is not visible.
The U.S. electrical grid is not a corporation. As for Microsoft, please explain why it says "our products just aren't engineered for security."
Court exhibits show that this was never designed to be secure.
Yggdrasil
2009-04-11 08:08:00
"Linux doesn’t make a good target because there are so few installations from which to run malicious code."
Is it accurate for me to say "so few"? Yes, Roy, because "60% of servers" is only impressive until you realize that servers make up a small percentage of ALL computers. Users outnumber servers, plain and simple. As unpleasant as it may be for you, the fact is that Linux is not a good target for botnets or malware because there are so few targets to choose from. There are security issues in Linux that will never need to be addressed because it will not achieve a majority market share.
By the way, the last 2 links in your reply are broken. I'm sure you have a catalog of every anti-Microsoft article in existence, but it might be update it and get some fresh material. The quote you reference is from a 2002 article that referenced Windows 2000, but lacked any real technical specifics.