Another Windows / MSIE security breach report

This one from executives at the search engine Google, who cite issues with Windows 7 and the version of Internet Explorer Windows 7 uses, version 8.0, as the primary reason for its more than 20,000 employees switching from Windows – based systems to Linux or Mac.

The alleged security breach in January is responsible for a theft of Google’s intellectual property and its subsequent reasoning for the change from Windows – based machines to Linux or Mac based systems.

It is equally likely that Google, who has plans to release its own OS, Chrome, later this year, which includes a version of the browser by the same name, may have decided to make the switch from Windows for competitive reasons and the reasons cited to Microsoft may have been less than genuine.

This means that Google now has an opportunity to open up the way for the Chrome OS to take more of a share of the current OS market.

Microsoft blogger Brandon LeBlanc, in a post from June 1, made the statement [paraphrased here] that hackers have openly admitted that Microsoft has made Windows more secure and more invulnerable to security threats than any competitor company who offers the same type of software products.

LeBlanc also commented that among the steps Microsoft is taking to do this, it is shipping updated software to its partner vendors, as well as offering security updates through its Microsoft Update and Windows Update pages [how to perform those updates is explained following the main article] as well as improving its BitLocker and Windows Firewall software.

Windows 7, according to the same post, uses Address Space Layout Randomization … as well by randomizing data in memory to improve security.

Address Space Layout Randomization (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, usually including the base of the executable and position of libraries, heap, and stack, in a process’s address space.

One very important issue to keep in mind, Microsoft support for Windows XP ended in April of this year and support for Windows Vista with no Service Packs ended about two weeks ago [on or about 15 July 2010]

As for how to perform the Windows update:

For versions of Windows prior to Vista, do not use Automatic Update. Instead, go to the site below.

For Windows Vista and Windows 7, go to the Control Panel and select Windows Update. in both cases, select only those updates marked critical and make certain you review any optional updates Microsoft offers because some of them are completely unnecessary. 

 

Microsoft and Windows OS software updates prior to Windows Vista

Advertisements

ENTERPRISE TECHNOLOGY SOLUTIONS ARCHITECT, PRINCIPAL CONSULTANT and TECHNOLOGY, MEDIA & TELECOMMUNICATIONS CONSULTING MANAGER - Highly disruptive, non – standard approach in the Information Systems & Technology Industry of initiating game – changing strategies to overturn the status quo and make the biggest, longest – lasting impact possible Demonstrable abilities in fostering personal and business - professional processes that allow people to overcome adversity and a firm belief in protecting developments in evolving technologies further allowing me to: A) Provide professional real – time technology advice and consultation to: Ø C - level Ø B2B / B2E Ø Individual Clients thereby being regarded as a valued advisor to all, including formerly by senior management B) Bridge communication gap between: ØØ Technical projects and organizational management / client objectives ØØ Projects with differing objectives ØØ Technicians and non-technical management and users ØØ Diverse specialists integrating diverse and often conflicting viewpoints; thereby facilitating communication between each VAR / CHANNEL PARTNER RELATIONSHIPS: Current: Intel, Seagate, AMD Fusion Partner, Kaspersky Labs, Crucial, Microsoft, NVidia, Oracle Networks, Novell Networks, Sun Microsystems (Current VAR / CP Applications Pending: Cavium Networks, NetLogic Microsystems, ASUSTek, Tyan, Targus) Past: Intel, Adobe Systems, AMD, Belkin, Creative Labs, Logitech, Microsoft, Oracle Networks, Novell Networks, Panasonic, Philips Electronics Research, Seagate, Sharp Electronics Corp., Sun Microsystems, Toshiba, Trend Micro CORE DISRUPTIVE MANAGEMENT COMPETENCIES / DISRUPTIVE MANAGEMENT VALUE OFFERINGS: Revenue Growth Initiatives, Technology Collaboration, Sarbanes Oxley Compliance, Cost Optimization, SLA Targets, Infrastructure Technologies, Due Diligence Reviews, Change Management, E – Business, Web 2.0, New Business Development, Process Re – engineering ASSET MANAGEMENT COMPETENCY / OFFERING: Cumulatively managed over $1.2 billion in military POL and civilian technological and computing solutions assets. CORE TECHNOLOGY COMPETENCIES / TECHNOLOGY VALUE OFFERINGS: Industry Standard Architecture, System Design, Network Planning / Design, Network Integration, Tier I / Tier II Software / Hardware Support, Technology Deployment, Software Lifecycle, IT Service Management, Enterprise Consulting, Technology QA / QC

Tagged with: , , , , , , , , , , ,
Posted in MSIE / Windows Security Breach

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: