Targetting the OS is old hat….



The Register sums up the Black Hat briefings pretty well. The Operating System level has received a lot of scrutiny in recent years for security flaws and as a result there has been a good deal of improvement there and so now, researchers are heading to the low hanging fruit of the REST of the software stack, be it the drivers, or browsers, or office software. Another area of software were those class of programs that run checking for updates for OTHER software. It’s time to realize that most ANY piece of software could compromise system security and updates need to be expected for most any part of the “software stack”.


What’s troubling though is reports that many of these software vendors are unprepared for security disclosures from researchers. Many do not have an easy way to be contacted with security related issues. What this mean is that we may be in for somewhat of a rocky ride as malware writers would seem to gain an upper hand by software developers lack of preparedness. Hopefully though, it will force most all shops (large and small) to adopt standard was of dealing with security related issues and announcements.

BTW, the original article showed up at Security Focus and was redistributed by the Register.

Related Posts

Blog Traffic Exchange Related Posts Blog Traffic Exchange Related Websites
  • Windows 7 Sales Spike to Overtake Mac OS X [/caption]Proving there is no accounting for taste Microsoft’s latest attempt at a decent operating system, Windows 7, is now running on 5% of the computers online.  The daily average of online users as measured by Internet metrics company Net Applications showed that an increase last week put Windows 7 above......
  • Coming Up with a Blog Niche Are you beginning a brand new blog? One of the first decisions that you are going to want to make is where you want to put your blog, and then you are going to need to choose a blog niche. One of the best ways to get your blog started......
  • Black Hat // Webcast 28 - HTTP Parameter Pollution Vulnerabilities in Web Applications HTTP Parameter Pollution Vulnerabilities in Web Applications // Marco Balduzzi http://links.covertchannel.blackhat.com/ctt?kn=4&m=36625440&r=ODMwMzU3MTg2MAS2&b=2&j=MTAxNjM3NzA1S0&mt=1&rt=0 ----------------------------------- OVERVIEW: While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site