Billions or trillions of dollars are lost or saved based on one's security
IN OUR most recent post about Windows insecurity news we showed that nothing is improving at Microsoft when it comes to security. It's only the messages (engagements with the public) that seemingly change. Last week we wrote about Microsoft pretending that it supports standards, which is an utter lie only PR can buy. Here is part of the PR where Microsoft joins Apple [1, 2, 3, 4, 5] in its attack on Flash, not just its attack on Theora, which we covered in:
MS criticises Adobe over security and performance. Physician, heal thyself!
The bottom line comes down to this: if your company plans to stay with XP well into 2011 and you're still using IE6, you've got to upgrade that browser. Knowing that IE9 won't support XP, you can safely move to IE8 knowing it's the end of the line for IE on XP. Or, you can move to Firefox, Chrome, Safari, or Opera -- but a company that's still stuck on IE6 isn't likely to be that adventurous. The web developers of the world will be happy with anything that gets you off IE6.
Microsoft on Tuesday will issue two critical bulletins that will fix vulnerabilities in Windows and Office, which if exploited successfully, could allow a remote attacker to take control of the computer, the company said Thursday.
Note that a policy such as this implies that Microsoft will not patch known, internally-discovered vulnerabilities if an externally-sourced vulnerability of the same or lesser severity is not available for the silent patch to piggyback on. They'll sit on it, and we won't know for how long because they don't document it.
#3 Tell the truth, misleadingly. The hardest lies to catch are those which aren't actually lies. You're telling the truth, but in a way that leaves a false impression. Technically, it's only a prevarication - about half a sin. A 1990 study of pathological liars in New York City found that those who could avoid follow-up questions were significantly more successful at their deceptions.
“Microsoft's security record continues to be poor simply because Microsoft does not handle security issues properly, having for example ignored known flaws for 5 months until a disaster came.”In other insecurity news, SharePoint 2007 has a 0-day vulnerability (meaning that it's already under attack). Microsoft has confirmed this [1, 2] and only issued a "workaround" rather than a solution [1, 2, 3]. As this one blogger puts it, there is "no SharePoint fix" and it says nothing about Microsoft's hiding of patches and flaws (clustering them is possible if one wants to crunch the numbers). How many flaws does Microsoft patch in SharePoint silently? In this case, Microsoft had no choice but to publicise it (someone beat Microsoft to it).
Microsoft's security record continues to be poor simply because Microsoft does not handle security issues properly, having for example ignored known flaws for 5 months until a disaster came [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12]. That's just negligence [1, 2, 3].
As a result of such negligence, IDG reports that "Conficker found on 25% of enterprise Windows PCs," according to Microsoft.
Conficker was far and away the most prevalent threat found on Windows machines in the second half of 2009 in the enterprise, Microsoft says. The company's security tools cleaned the Conficker worm from one quarter of enterprise Windows machines.
Microsoft Sees Infected PC Numbers Climbing
[...]
The numbers of PCs cleaned by Microsoft's anti-malware software worldwide during the second half of 2009 continued to trend upward, suggesting that more PCs are getting infected in total, according to the company's latest Security Intelligence Report (SIR).
"Lots of times, there's confusion in these treaty negotiations because of lack of clarity about which problems they're trying to solve," said Scott Charney, vice president of Microsoft Corp.'s Trustworthy Computing Group, before a speech at the Worldwide Cybersecurity Summit.
[...]
Charney, of Microsoft, believes cyber threats should be better differentiated. He proposes four categories: conventional computer crimes, military espionage, economic espionage and cyberwarfare. That approach, he argues, would make it easier to craft defenses and to discuss international solutions to each problem.
Comments
Yuhong Bao
2010-05-14 00:46:53
Dr. Roy Schestowitz
2010-05-14 00:57:09
Microsoft rarely gets caught because it's hard to review binary-only patches.
Yuhong Bao
2010-05-14 01:01:11
Dr. Roy Schestowitz
2010-05-14 06:06:08
Yuhong Bao
2010-05-13 02:14:47