Vista security an issue at show

Microsoft's Vista OS may not be invulnerable to hacking, but will incorporate several features to front a better defense.

Microsoft has placed security as one of the top selling points for the Windows Vista OS, due out at the end of next year. But exactly how much more secure Vista will be than its predecessors is a point of concern here at the Microsoft IT Forum 2005 in Barcelona.

Vista will face an increasingly malicious online playing field, where it will be carefully probed by virus writers and hackers, said industry insiders here.

Banks haven't been able to completely stop bank robbers, said Amy Roberts, Microsoft's director of the Security Business and Technology Unit, but many of the new features in Vista will reduce the risk and ability for machines -- and their users -- to fall victim.

"I do think it will offer improved protection," Roberts said Wednesday during an interview at the Microsoft IT Forum 2005 in Barcelona.

And some security experts appear to agree that it has improved. Marcus Murray, senior security advisor for TrueSec, said he had seen Vista's security features under a nondisclosure agreement. While he did not elaborate on specifics, he said security was better, but warned that nothing is invulnerable.

A few of those security features have already been incorporated into Windows XP Service Pack 2, including data-execution protection that uses both software and hardware capabilities to deflect damage from buffer-overflow attacks, Roberts said. Antispyware protection under the renamed product Windows Defender will be incorporated into Vista, through Internet Explorer 7.

In addition, a user-account protection feature in Vista allows for greater control of the access a person has to perform certain functions, Robert said.

Murray commented on Vista during a session titled "Why I can hack your Windows network in a day." Earlier in the session, Murray showed how it was possible to perform several hacks by downloading a few free GUI (graphical user interface) tools. One of those he demonstrated was a Trojan horse creation and management tool.

Running on a host computer after delivery via e-mail, the Trojan allows for complete control of the computer and installation of a range of other malicious tools that allow other actions such as keystroke logging, Murray showed. After the Trojan was installed, a window popped up in the lower right-hand corner on Murray's computer that said "A new victim is available."

"Almost anybody today can be a hacker," he said.

When asked if the free hacking tool would work with Windows Vista, he said it is possible it would but in any case "there will be new tools."

One of out of 10 people react to a phishing e-mail, Murray said, and more than 70 percent of computers are running some sort of malware, or harmful software. Phishing is a technique used to trick people into responding to a fraudulent e-mail asking for personal information, such as an e-mail that asks for a user name or password to an online banking site

The problem is that antivirus technology is reactive, and it takes someone to notice a virus or malware for it to be reported and counteracted, Murray said. But many Trojans have small footprints and are hard to detect.

In a recent case where three Dutch men have been accused of illegally controlling 1.5 million computers, those machines were downloading new versions of their malware as antivirus programs caught up with previous ones, he said.

Virus and malware creators are more interested now in financial gain, rather than in the past when the goal of the "bad guys" was to show their intelligence, Roberts said. "That has changed the notion of what we are trying to protect against," she said.

"It's pretty scary," said Jonathan Noble, who runs Windows PC clients as a computing officer for the University of Newcastle at Newcastle upon Tyne in England, of the presentation. "It still means you have an awful lot of potential problems."

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?