Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

10/13/2006
07:00 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

AV Vendors Need Not Fear Microsoft

That from an ex-Microsoft security manager who says Redmond's antivirus moves will mostly help, not hinder, the market

With Microsoft's Forefront security tools due to arrive soon, antivirus vendors are wondering if they'll lose ground to the software giant.

One competitor isn't sweating it, though. Randy Abrams, formerly Microsoft's operations manager for its Global Infrastructure Alliance for Internet Safety and now the director of technical education for AV company Eset, says his former employer's entry into the AV space won't hurt the little guys like his company, but it will put the squeeze on large companies like McAfee, Symantec, Trend Micro, and Computer Associates.

Abrams told attendees of the Virus Bulletin Conference in Montreal today that conspiracy theories that Microsoft's Live OneCare and Forefront AV lines represent "extortion" by Microsoft are offbase. "Microsoft does not deliberately put vulnerabilities in code to [sell] security software."

Microsoft had no AV offering during Abrams' tenure there, so his job was to work with the AV vendors to share information about Microsoft's products and technology. "I'm in a unique position having worked for Microsoft for so long and now I'm working in the AV industry," Abrams says.

Although he adds that Microsoft's initial version of the software hasn't exactly been a showstopper (Abrams notes that OneCare still couldn't detect the zero-day vulnerability found in Excel back in June even after its disclosure and seven AV companies issued updates on it), it will evolve into a viable AV contender. "Microsoft is going to make it better and better." And that will raise the bar for the larger AV companies, which typically aren't known for speedy innovation, he says.

As for concerns about whether Microsoft will readily share information with other AV vendors, Abrams says even though the group in Microsoft responsible for sharing information with the AV industry is now also the same one responsible for the security offerings, this "unholy alliance" likely will be advantageous in the end for everyone.

He thinks Microsoft will be better at sharing information now that it's going to be a member of the AV community. "Any information that the Microsoft antivirus product group has about Microsoft software will probably have to be shared in order to prevent legal problems."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Microsoft Corp. (Nasdaq: MSFT)
  • ESET Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 8/10/2020
    Researcher Finds New Office Macro Attacks for MacOS
    Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
    Hacking It as a CISO: Advice for Security Leadership
    Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Changing Face of Threat Intelligence
    The Changing Face of Threat Intelligence
    This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-8904
    PUBLISHED: 2020-08-12
    An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (en...
    CVE-2020-8905
    PUBLISHED: 2020-08-12
    A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied into three different 'extents'. The length of ...
    CVE-2020-12106
    PUBLISHED: 2020-08-12
    The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows unauthenticated users to send HTTP POST request to several critical Administrative functions such as, changing credentials of the Administrator account or connect the product to a rogue access point.
    CVE-2020-12107
    PUBLISHED: 2020-08-12
    The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows command injection via a text field, which allow full control over this module's Operating System.
    CVE-2020-7374
    PUBLISHED: 2020-08-12
    Documalis Free PDF Editor version 5.7.2.26 and Documalis Free PDF Scanner version 5.7.2.122 do not appropriately validate the contents of JPEG images contained within a PDF. Attackers can exploit this vulnerability to trigger a buffer overflow on the stack and gain remote code execution as the user ...