Blog Posts Tagged with "Microsoft"

69dafe8b58066478aea48f3d0f384820

Microsoft's Addiction to Collecting Tracking Data

September 01, 2011 Added by:Headlines

"The Windows Mobile operating system is clearly sending information that can lead to accurate location information of the mobile device regardless of whether the user allowed it," said Kamkar, who provided the analysis of the tracking methods for Lawyers seeking to establish a class action lawsuit...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Black Hat USA 2011 Presenters - A Live Webcast

August 24, 2011 Added by:Headlines

The organizers of the Black Hat USA 2011 conference which took place earlier this month are inviting those who attended and those who missed the event to join them for a live webcast featuring some of the conference's speakers. The free webcast airs on Thursday, Aug 25, 2011...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Microsoft and Amazon Outages – The Need for More Redundancy

August 23, 2011 Added by:Ben Kepes

I’ll not delve into the issues around failover – clearly the lightning strike was a catastrophic event that overcame the protection that both providers have against upstream events. But imagine an uber-catastrophic event that knocked out the entire Dublin Amazon data center...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Ceases Using Supercookies to Track Users

August 22, 2011 Added by:Headlines

“We don't really know what they were doing with this information, but it's not obvious what this explanation would be. The burden is on Microsoft to explain how it came to be there and how they used it and what they're going to do to make sure it doesn't happen again..."

Comments  (0)

7c5c876d1933023ac375eead04302e1a

Black Hat USA 2011, ISC2 and the Shady Rat

August 07, 2011 Added by:Boris Sverdlik

Information Security is a funny animal, what other industry can you mass market something that does absolutely nothing and have the product sell itself due to marketing? Why wouldn't you throw sex into the mix? All I can say is... RIGHT ON McAfee! Next year get some unicorns with boobs...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Database Tracks Laptops and Smart Phones

August 01, 2011 Added by:Headlines

The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

PowerShell 2.0 Protects You From Viruses

July 26, 2011 Added by:Dawn Hopper

You can imagine that when building PowerShell, Microsoft surely wanted to avoid the disaster produced by the freely-executable nature of VBScript and JavaScript on Windows systems. PowerShell was launched with some significant protections against this kind of mischief...

Comments  (1)

Ba829a6cb97f554ffb0272cd3d6c18a7

Solving The End User Problem

July 19, 2011 Added by:Kevin McAleavey

One of the more useful tools for Windows clients was a product called "Steady State." It allowed a system to be "snapshotted" and in the event of malware intrusion, a reboot would restore the client to its previous snapshot. But like most good ideas, Microsoft discontinued it...

Comments  (3)

959779642e6e758563e80b5d83150a9f

Why Windows is a Bad Idea for Medical Devices

July 12, 2011 Added by:Danny Lieberman

Vendors that use Windows for less critical devices are actually increasing the threat surface for a hospital since any Windows host can be a carrier of malware, regardless of it’s primary mission function, be it user-friend UI at a nursing station or intensive care monitor at the bedside...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress to Use Skype Despite Security Concerns

June 29, 2011 Added by:Headlines

Members of Congress will now be allowed to use Skype video conferencing on government networks. The announcement comes on the heels of revelations that Microsoft had filed a application in 2009 seeking to patent technology that allows for surreptitious recording of Skype transmissions...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Microsoft: WebGL is Too Dangerous to Support

June 28, 2011 Added by:Bill Gerneglia

If there is one thing that Microsoft knows well, it is security holes in operating systems and device drivers. They have been heavily engaged in finding complex engineering solutions to solve some of the most difficult security compromises for more than 20 years. We should all listen to this warning...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Ban Windows from Embedded Medical Devices

June 24, 2011 Added by:Danny Lieberman

The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Why Your Vendor Doesn’t Want You to do Risk Analysis

June 23, 2011 Added by:Danny Lieberman

Small business IT integrators are behind the curve on security, compliance, disaster recovery and application security. The typical SMB integrator mindset is dominated by the Microsoft monoculture, and I would not expect them to be able to analyze data security threats...

Comments  (3)

959779642e6e758563e80b5d83150a9f

Microsoft Gives Source Code to Chinese Government

June 13, 2011 Added by:Danny Lieberman

Having access to Windows source code has made it easier for Chinese cyber attackers to write attack code to penetrate and compromise US defense contractors, critical infrastructure and activist groups like change.org - who all still use highly vulnerable Windows monoculture products...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Microsoft Monoculture as a Threat to National Security

June 10, 2011 Added by:Danny Lieberman

A report from a stellar cast of infosec experts and thought leaders shows that the complexity and dominance of Microsoft’s Windows operating system in US Federal agencies makes the government prone to cyber attack – a national security threat. This was in September 2003...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

TDSS Rootkit Boasts Self-Propagating Mechanisms

June 07, 2011 Added by:Headlines

"If the victim computer is located on a network using the DHCP protocol, the worm starts scanning the network to see if there are any available IP addresses. After that, the worm launches its own DHCP server and starts listening to the network..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »