Blog Posts Tagged with "Microsoft"
Microsoft's Addiction to Collecting Tracking Data
September 01, 2011 Added by:Headlines
"The Windows Mobile operating system is clearly sending information that can lead to accurate location information of the mobile device regardless of whether the user allowed it," said Kamkar, who provided the analysis of the tracking methods for Lawyers seeking to establish a class action lawsuit...
Comments (0)
Black Hat USA 2011 Presenters - A Live Webcast
August 24, 2011 Added by:Headlines
The organizers of the Black Hat USA 2011 conference which took place earlier this month are inviting those who attended and those who missed the event to join them for a live webcast featuring some of the conference's speakers. The free webcast airs on Thursday, Aug 25, 2011...
Comments (0)
Microsoft and Amazon Outages – The Need for More Redundancy
August 23, 2011 Added by:Ben Kepes
I’ll not delve into the issues around failover – clearly the lightning strike was a catastrophic event that overcame the protection that both providers have against upstream events. But imagine an uber-catastrophic event that knocked out the entire Dublin Amazon data center...
Comments (0)
Microsoft Ceases Using Supercookies to Track Users
August 22, 2011 Added by:Headlines
“We don't really know what they were doing with this information, but it's not obvious what this explanation would be. The burden is on Microsoft to explain how it came to be there and how they used it and what they're going to do to make sure it doesn't happen again..."
Comments (0)
Black Hat USA 2011, ISC2 and the Shady Rat
August 07, 2011 Added by:Boris Sverdlik
Information Security is a funny animal, what other industry can you mass market something that does absolutely nothing and have the product sell itself due to marketing? Why wouldn't you throw sex into the mix? All I can say is... RIGHT ON McAfee! Next year get some unicorns with boobs...
Comments (0)
Microsoft Database Tracks Laptops and Smart Phones
August 01, 2011 Added by:Headlines
The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...
Comments (0)
PowerShell 2.0 Protects You From Viruses
July 26, 2011 Added by:Dawn Hopper
You can imagine that when building PowerShell, Microsoft surely wanted to avoid the disaster produced by the freely-executable nature of VBScript and JavaScript on Windows systems. PowerShell was launched with some significant protections against this kind of mischief...
Comments (1)
Solving The End User Problem
July 19, 2011 Added by:Kevin McAleavey
One of the more useful tools for Windows clients was a product called "Steady State." It allowed a system to be "snapshotted" and in the event of malware intrusion, a reboot would restore the client to its previous snapshot. But like most good ideas, Microsoft discontinued it...
Comments (3)
Why Windows is a Bad Idea for Medical Devices
July 12, 2011 Added by:Danny Lieberman
Vendors that use Windows for less critical devices are actually increasing the threat surface for a hospital since any Windows host can be a carrier of malware, regardless of it’s primary mission function, be it user-friend UI at a nursing station or intensive care monitor at the bedside...
Comments (0)
Congress to Use Skype Despite Security Concerns
June 29, 2011 Added by:Headlines
Members of Congress will now be allowed to use Skype video conferencing on government networks. The announcement comes on the heels of revelations that Microsoft had filed a application in 2009 seeking to patent technology that allows for surreptitious recording of Skype transmissions...
Comments (0)
Microsoft: WebGL is Too Dangerous to Support
June 28, 2011 Added by:Bill Gerneglia
If there is one thing that Microsoft knows well, it is security holes in operating systems and device drivers. They have been heavily engaged in finding complex engineering solutions to solve some of the most difficult security compromises for more than 20 years. We should all listen to this warning...
Comments (0)
Ban Windows from Embedded Medical Devices
June 24, 2011 Added by:Danny Lieberman
The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...
Comments (0)
Why Your Vendor Doesn’t Want You to do Risk Analysis
June 23, 2011 Added by:Danny Lieberman
Small business IT integrators are behind the curve on security, compliance, disaster recovery and application security. The typical SMB integrator mindset is dominated by the Microsoft monoculture, and I would not expect them to be able to analyze data security threats...
Comments (3)
Microsoft Gives Source Code to Chinese Government
June 13, 2011 Added by:Danny Lieberman
Having access to Windows source code has made it easier for Chinese cyber attackers to write attack code to penetrate and compromise US defense contractors, critical infrastructure and activist groups like change.org - who all still use highly vulnerable Windows monoculture products...
Comments (2)
Microsoft Monoculture as a Threat to National Security
June 10, 2011 Added by:Danny Lieberman
A report from a stellar cast of infosec experts and thought leaders shows that the complexity and dominance of Microsoft’s Windows operating system in US Federal agencies makes the government prone to cyber attack – a national security threat. This was in September 2003...
Comments (2)
TDSS Rootkit Boasts Self-Propagating Mechanisms
June 07, 2011 Added by:Headlines
"If the victim computer is located on a network using the DHCP protocol, the worm starts scanning the network to see if there are any available IP addresses. After that, the worm launches its own DHCP server and starts listening to the network..."
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization