Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Microsoft Secures Vista With LSD

    By
    Ryan Naraine
    -
    August 14, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Remember the last stage of Delirium hacking group?

      In 2003, the group of four Polish security researchers discovered the vulnerability that would later be used by others to unleash the Blaster worm, but because of distrust over Microsofts willingness to address software flaws at the time, members had to be coaxed into sharing their findings.

      The group, known as LSD, is now on Microsofts payroll working on what is being hailed as the “largest ever penetration test” of an operating system coming out of Redmond, Wash.

      According to John Lambert, senior group manager in Microsofts SWI (Secure Windows Initiative), LSD members are part of an “internal team of hackers” conducting simulated attacks against Windows Vista.

      The groups members are all computer science graduates of Poznan University of Technology and have worked as the security team at the Poznan Supercomputing and Networking Center, in Poznan, Poland.

      The hiring of third-party security research outfits and independent hackers is significant on several fronts. It underscores Microsofts public push to embrace the hacking community and helps repair the companys poor image and track record on security.

      The list of external security consultants hired to audit the Vista code to look for weaknesses, technical flaws and vulnerabilities reads like a whos who in the research community. Lambert said about 20 well-known researchers who regularly appear at Microsofts annual Blue Hat conference have been given access to the full source code, specs and threat models for review.

      “Were not blocking them from looking anywhere. They have access to everything. [They can] go everywhere and find all the bugs [they] absolutely can,” said Lambert.

      The pen testers had full access to product team members and security engineers in Redmond and spent between one week and two months hacking and trying to break potential targets within Vista.

      Lambert said the tests were diagnostic in nature and included remediation where necessary.

      At the Black Hat Briefings here, Lambert shared a sampling of the pen test results, which he said yielded “rabbit holes” and a wide range of contradictions in security assumptions.

      The code review also turned up what Lambert called “failure of imagination,” process handicaps, and several comical and unwise file names.

      Austin Wilson, director of Windows product management, said the company also retained 10 outside consultancies to help with the implementation of the SDL (Security Development Lifecyle), Microsofts mandatory cradle-to-grave principles that cover every stage of software creation.

      Microsoft has also retained research companies including Matasano Security, a New York-based startup staffed by several high-profile security experts, and NGSSoftware, or Next Generation Security Software, in Surrey, England, a database security outfit renowned for its work uncovering flaws in Oracle products, to test Vista security.

      Ryan Naraine

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×