Vista Aims to Stop Hackers Social Engineering Ploys

 
 
By Matt Hines  |  Posted 2007-01-16 Email Print this article Print
 
 
 
 
 
 
 

News Analysis: Microsoft maintains that by addressing the social aspect of IT attacks, the portion that can dupe even the smartest users into launching malware-laden attachments or clicking unknown URLs, Vista will improve PC security significantly

Microsoft says the Windows operating system software is not the weakest link in desktop security, and contends that Windows Vista will help limit the greatest vulnerability of all—users bad decision-making. While previous iterations of Microsofts dominant operating system hit the market with an abundance of security loopholes that left users open to many different forms of attack, Microsoft officials said new features offered in Vista will not only make it harder for malware writers attack the OS, but will also make it more difficult for users to hang themselves out to dry. Executives pointed to Microsofts SDL (Security Development Lifecycle) program as an attempt to root out many of the coding flaws that have left gaping security holes in previous versions of Windows during development, and said the primary thrust of the security tools added in Vista has been to help customers help themselves.
From its UAC (User Account Control) feature, which is meant to limit the ability of viruses to gain access to administrator status on desktops, to the anti-phishing filters built into the newly released Internet Explorer 7 browser, Microsoft has attempted to give users the mechanisms they need to do a better job of watching their own backs, said Ben Fathi, the Redmond, Wash., companys vice president for the Windows core operating system.
Microsoft doesnt expect that Vista will be tight enough to evade all forms of malware, despite all the work done to shut holes via the SDL program, Fathi said, but it does believe it has given users the right set of warnings and tools to help better police their own habits. For advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub. "The weakest link in the security of any system is the end user. It seems like were putting them down, but, realistically, theres a lot we can do in technology to secure our products, but as long as user can be tricked into clicking a link or going to an unknown Web site, were at risk," Fathi said. "We think that by helping users protect themselves better, we can make a big dent in the current methods of attacks being used by hackers."
Zero-day exploits and self-cloaking rootkits may be all the rage at the most complex end of the malware spectrum, but most users encounter PC security issues because they fall for social engineering tactics and make mistakes such as opening malware e-mails sent from spoofed domains of familiar sources and following links to Web pages that offer viruses and other attacks along with their advertised content, Fathi said. UAC promises to help users prevent viruses from spreading within a machine by prompting the user to approve nearly every change to the system such a program might try to make. Whereas programs that tap into a machines administrative controls to advance their reach largely operated in secret before Vista, users will now have the ability to shut the attacks down as they try to proliferate, Microsoft claims. The anti-phishing technologies in IE 7 utilize onboard heuristics, as well as site-blocking capabilities based on traditional black- and whitelists, to give users an idea of the security status of every site they attempt to access. Known malware and phishing sites are automatically blocked, whereas every other site gets a red, yellow or green rating, based on the characteristics it exhibits to the browser. Other security features integrated into Vista include Microsofts Windows Defender spyware scanning and removal tool, and its BitDefender drive encryption system, which aims to help protect data in the case of stolen devices. In the past, even users with great technical expertise or aggressive IT administrators looking out for them still often ended up falling for the most convincing forms of online fraud, but the additional layer of protection will stop most criminal efforts before malware can land on the desktop, according to Microsoft. By arming users with a browser that flashes red around the edges when they attempt to access a suspected phishing site, Microsoft can help customers make wiser security decisions on their own, Fathi said. Some security vendors are already criticizing Vistas onboard security components, with anti-virus market leader Symantec calling UAC too chatty to have a significant impact on safety, predicting that users will come to ignore the many warnings the system produces. Since the volume and complexity of the UAC security warnings will overwhelm most users, and potentially leave enterprise IT administrators drowning in a sea of related help tickets, many users will simply opt to run with the system off, Symantec officials said. Click here to read more about Symantecs criticisms of Windows Vistas UAC feature. In order to maximize the usefulness of UAC, Symantec said it is currently developing products that will manage UAC and the other Vista security tools to make them less obtrusive. However, some experts say they believe the attempt to limit the social aspect of IT threats will strike many people as positive, useful and adequate. Lee Nicholls, global solutions director for consultant firm Getronics, said he believes that all but the most demanding customers will be encouraged by the work that Microsoft has done. Part of Nicholls job is helping to select the products that Getronics recommends to its customers, and he said the firm will encourage businesses to utilize Vistas onboard protections. Nicholls works at Microsofts Redmond, Wash., campus, where he studies all of the software makers latest technologies. "Weve seen all this technology provided for Windows before by third-party vendors, but customers were forced to figure out numerous processes for troubleshooting between applications, which created some additional security issues," Nicholls said. "Now all the management is there in the product, which makes it easier for end users, and for us, to try to solve problems as they arise." While Getronics will continue to work with aftermarket security vendors and consider products such as Symantecs that promise to improve Vistas protections, he said that most users will be satisfied with the onboard tools, and that this may shift buying patterns when companies formulate their future IT security budgets. "At the client security level, I honestly believe that Vista will probably provide enough protection for most companies to feel sufficiently safe, and move away from traditional third-party tools," Nicholls said. "This will encourage companies to spend more money on their perimeter solutions as client security becomes less of an issue; whereas before companies spent a lot of time and money integrating anti-virus, with Vista they can shift their focus to adding security services at the edge of their operations." Even analysts who have been critical of Vistas security features during their development said the IT market landscape will change as a result of all the work Microsoft has done. Andrew Jaquith, an analyst for Yankee Group Research, said UAC and other features may be seen as an obstruction by some users, but he believes that anti-virus software makers and other vendors will need to rethink their own product strategies as a result of Vista. "Obviously there will still be a lot of opportunities for third-party companies to make improvements to the security capabilities in Vista, and to lend additional tools that Microsoft hasnt yet included in the OS," he said. "But I think these third parties should focus on building those products that help, instead of nitpicking what Microsoft has already done; the Vista world will be very different for Windows users and for the security industry, its new footing for everyone." Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel