This page permanently redirects to gemini://gemini.techrights.org/2009/01/16/unix-linux-security/.
Posted in GNU/Linux, Mail, Microsoft, Security, UNIX, Vista, Windows at 6:38 am by Dr. Roy Schestowitz
“Two security researchers have developed a new technique that essentially bypasses all of the memory protection safeguards in the Windows Vista operating system…”
–Dennis Fisher, August 7th, 2008
Peter Kraus and David Gerard drew attention to the following interview with an author of adaware a few days ago. It explains in simple terms why Windows is inherently lacking in terms of security as it accommodates intrusion, despite all the denialist spinning [1, 2, 3]. Here is just a portion of this interview:
=> 1 | 2 | 3 | ↺ a portion of this interview
Eventually, instead of writing individual executables every time a worm came out, I would just write some Scheme code, put that up on the server, and then immediately all sorts of things would go dark. It amounted to a distributed code war on a 4-10 million-node network.S: In your professional opinion, how can people avoid adware?M: Um, run UNIX.S: [ laughs]M: We did actually get the ad client working under Wine on Linux.S: That seems like a bit of a stretch!M: That was a pretty limited market, I’d say.
Earlier in the week we found reports of new holes in Windows.
=> ↺ reports of new holes in Windows
As previously announced, Microsoft has released a security update for Windows to close a total of three holes in the SMB protocol implementation. All three holes are based on buffer overflows. Two of them can apparently be exploited to inject and execute code remotely, without previous authentication. The third buffer overflow reportedly only causes the computer to reboot.
This is a lot more serious than Microsoft wants people to realise.
Microsoft Patch Tuesday bug is scaryTHE FIRST Patch Tuesday fix of 2009 put out by Microsoft addresses a dangerous security vulnerability in its Server Message Block (SMB) protocol, or so say some insecurity experts
“It is no exaggeration to say that the national security is also implicated by the efforts of hackers to break into computing networks. Computers, including many running Windows operating systems, are used throughout the United States Department of Defense and by the armed forces of the United States in Afghanistan and elsewhere.”
–Jim Allchin, Microsoft
The pace of infection is very high and one worm alone is claimed to have seized millions of Windows-run computers in just one day.
=> ↺ millions of Windows-run computers in just one day
The computer worm that exploits a months-old Windows bug has infected more than a million PCs in the past 24 hours, a security company said today.
One worm alone is spreading like wildfire.
=> ↺ is spreading like wildfire
Report: 2.5 million PCs infected with Conficker wormAccording to F-Secure, there are already almost 2.5 million PCs infected with the Conficker worm, also known as Downadup. Since the worm has the ability to download new versions of itself, it is expected that the infection could spread much further. The new code is downloaded from domain names generated with a complex algorithm, making it hard to predict what domains will be used to spread the worms updates.
About 300 million PCs are still primed to become zombies too because of this one flaw.
=> ↺ primed to become zombies too
With nearly a third of all Windows systems still vulnerable, it’s no surprise that the “Downadup” worm has been able to score such a success, Kandek said. “These slow [corporate] patch cycles are simply not acceptable,” he said. “They lead directly to these high infection rates.”
In general, it is estimated that 98% of Windows PCs are ripe for hijacking [1, 2].
Is there room for some humour in all this?
Here’s a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote.That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.The message is surprisingly cordial, given that Microsoft’s security researchers spend their days trying to put people like Zlob’s author out of business. “Just want to say ‘Hello’ from Russia. You are really good guys. It was a surprise for me that Microsoft can respond on threats so fast,” the hacker wrote, adding, “Happy New Year, guys, and good luck!”
Many people remember Windows for submarines — a fiasco that reportedly led to the departure of many angry engineers. Well, not more than a month passes by and the Royal Navy, which runs Windows, gets stung by a virus infection that causes harm. Interestingly enough, the report from The Register mentions only lost E-mail as the severe consequence, but surely there is considerably more.
=> Windows for submarines | ↺ gets stung by a virus infection that causes harm
The Ministry of Defence confirmed today that it has suffered virus infections which have shut down “a small number” of MoD systems, most notably including admin networks aboard Royal Navy warships.The Navy computers infected are the NavyStar (N*) system, based on a server cabinet and cable-networked PCs on each warship and used for purposes such as storekeeping, email and similar support functions. N* ship nets connect to wider networks by shore connection when vessels are in harbour and using satcomms when at sea.
It is no surprise that the United States military gradually moves to Red Hat Linux. Crucial operations were getting stung by Windows, even in the recent past.
=> getting stung by Windows, even in the recent past
Along with a rise of botnets, whose masters exploit vulnerabilities in Windows, comes a lot more SPAM as well. SPAM affects everyone.
The demise late last year of four of the world’s biggest spam botnets was good news for anyone with an email inbox, as spam levels were cut in half – almost overnight. But the vacuum has created opportunities for a new breed of bots, some of which could be much tougher to bring down, several security experts are warning.
This short report is based on just a few days. Nothing has improved — security-wise — in Microsoft’s product line. █
“Usually Microsoft doesn’t develop products, we buy products. It’s not a bad product, but bits and pieces are missing.”
–Arno Edelmann, Microsoft’s European business security product manager
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink Send this to a friend
=> Permalink | ↺ Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
text/gemini;lang=en-GB
This content has been proxied by September (ba2dc).