Microsoft message to security world: Trust Us
,----[ Quote ]
| I showed Bruce Schneier, chief security technology officer for BT, the End to
| End Trust documents and he said "it feels general and like marketing hype."
| The notion that the world needs centralized authentication "is just silly,"
| he added.
|
| Basically, Microsoft has used its trusted computing efforts, such as
| inserting identity rights management into Office 2003, to lock people into
| using its products, Schneier said.
|
| "Microsoft has used this as an anti-competitive tool," he said.
`----
http://www.news.com/8301-10784_3-9914240-7.html?tag=nefd.lede
The headline is amusing because a company asks for trust despite the fact that
40% of the PCs running its software are controlled by a criminal (reference at
the bottom).
Microsoft preaches togetherness for online security
,----[ Quote ]
| Six years after scrambling to lock down Windows and having challenged
| security vendors on home turf with Windows Vista, Microsoft is calling for
| a "dialogue" over online security and privacy.
`----
http://www.regdeveloper.co.uk/2008/04/08/mundie_windows_interoperability/
Recent:
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
What spooks Microsoft's chief security advisor
,----[ Quote ]
| Speaking at the Boston SecureWorld conference Wednesday, the 19-year
| Microsoft veteran whose job includes protecting enterprises, developers and
| Microsoft itself said there actually is plenty of good news on the security
| front. For example, his outfit scans a half million devices (with customer
| permission) per month and in the first half of last year saw the first
| period-over-period decline in new vulnerabilities disclosed across Microsoft
| and non-Microsoft software since 2003.
|
| However, 3,400 new vulnerabilities were discovered and “it’s still a big
| number,” Arsenault says. “So if vulnerability rates are down, where are
| they?”
`----
http://www.networkworld.com/news/2008/032608-microsoft-security-concerns.html
With Vista breached, Linux unbeaten in hacking contest
,----[ Quote ]
| The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on
| the last day of the contest; but it was Linux, running on a Sony Vaio, that
| remained undefeated as conference organizers ended a three-way computer
| hacking challenge Friday at the CanSecWest conference.
`----
http://www.linuxworld.com/news/2008/032908-with-vista-breached-linux-unbeaten.html?fsrc=rss-linux-news
|
|