Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Exploit Code / Malware

Some Insight (Incite?) on the WSJ IT Security Controls Article

– Alex at RiskManagementInsight noted that the Wall Street Journal (WSJ) published an article explaining to users how they can circumvent their organization’s IT security controls. The other night I met an individual who was very close to the creation of the WSJ article linked above. Said…

IIS or Apache? Who serves more malware?

– Google: Server Type Propagating Malware Dependent on Country From the Google Security blog: Overall, we see a mix of results. In Germany, for instance, Apache is more likely to be serving malware than Microsoft IIS, compared to the overall distributions of these servers. In Asia, we see the…

Rapid Fix and Deployment – The next big security metric for Microsoft

– With Microsoft’s increase in patch Quality Assurance and the increase in Vista security, Microsoft customers may now begin to request quicker patch cycles and turnaround time after zero-day vulnerabilities are announced. Microsoft created Patch Tuesday in response to customer feedback…

FUD: Kaspersky Claims Vista May Be Less Secure Then XP

– Even if UAC is 100% broken, turned off and never used as per Kaspersky’s claim, Vista’s Memory Address Randomization (here, here) will significantly help prevent exploit code. This in itself is an excellent stride forward in securing the memory of the computer from corruption and…

Blame it on Security: Vista Home Edition Cannot Run in Virtualization Software

– MSNBC reports Vista Home Edition cannot run in virutalization software due to bluepill rootkit threats: The least-expensive versions of Vista actually would work in virtualization programs. But Microsoft wants to restrict it because of new security holes spawned by the technology, according to…