Targetting the OS is old hat….



The Register sums up the Black Hat briefings pretty well. The Operating System level has received a lot of scrutiny in recent years for security flaws and as a result there has been a good deal of improvement there and so now, researchers are heading to the low hanging fruit of the REST of the software stack, be it the drivers, or browsers, or office software. Another area of software were those class of programs that run checking for updates for OTHER software. It’s time to realize that most ANY piece of software could compromise system security and updates need to be expected for most any part of the “software stack”.


What’s troubling though is reports that many of these software vendors are unprepared for security disclosures from researchers. Many do not have an easy way to be contacted with security related issues. What this mean is that we may be in for somewhat of a rocky ride as malware writers would seem to gain an upper hand by software developers lack of preparedness. Hopefully though, it will force most all shops (large and small) to adopt standard was of dealing with security related issues and announcements.

BTW, the original article showed up at Security Focus and was redistributed by the Register.

Related Posts

Blog Traffic Exchange Related Posts
  • Green AV Remove | Remove Green Antivirus 2009 I'm seeing a lot of searches for how to remove the rogue antivirus green AV. It looks like it's the latest flavor of the minute in the rogue security application crowd. My usual path for removing a rogue antivirus or antispyware application is the same as any other malware, try......
  • Identity theft protection and update on Massive Identity theft story Sunbeltblog has another update related to their earlier story about the massive identity theft ring. In this story they make clear that the keylogger was NOT directly related to coolwebsearch. It was apparently seperate and independant it was discovered during a coolwebsearch infestation, but appears unrelated. They also detail suggestions......
  • How to Remove Internet Security 2010 | Internet Security 2010 Removal Guide Internet Security 2010 is the name of a rogue antivirus application that is one of the more recent to be making the rounds. It will typically install itself on your system through the use of other malware. These rogue antivirus applications typically will pop up warnings and alerts about the......
Blog Traffic Exchange Related Websites
  • Lending Club Update: Earning 15.6% NAR on P2P Lending Investments ~ ~ ~ April 2011 Update: Shutting Down My Lending Club Investments over Q&A Change ~ ~ ~   My Lending Club investment portfolio is┬ácontinuing┬áto look fairly impressive as we close the books on 2010. Summary Net Annual Return is up to 15.64% NAR. My highest observed NAR was 15.69%,......
  • Microsoft Warns of SQL Attack SQL stands for Structured Query Language. SQL Attack is kind of Hacking attack. Just days after patching a critical flaw in its Internet Explorer browser, Microsoft is now warning users of a serious bug in its SQL Server database software. Microsoft issued a security advisory late Monday, saying that the......
  • Black Hat // Webcast 28 - HTTP Parameter Pollution Vulnerabilities in Web Applications HTTP Parameter Pollution Vulnerabilities in Web Applications // Marco Balduzzi http://links.covertchannel.blackhat.com/ctt?kn=4&m=36625440&r=ODMwMzU3MTg2MAS2&b=2&j=MTAxNjM3NzA1S0&mt=1&rt=0 ----------------------------------- OVERVIEW: While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site