Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:35 PM
Rob Enderle
Rob Enderle

Windows 7 Will Mostly Be More Secure Than Leopard

Apple's Snow Leopard will be attacked more than any other version of the vendor's platform, and Apple's use of a s"ecurity by obscurity policy" where it does its very best not to actually talk in any depth about the subject will likely bite it in the butt this time.

Apple's Snow Leopard will be attacked more than any other version of the vendor's platform, and Apple's use of a s"ecurity by obscurity policy" where it does its very best not to actually talk in any depth about the subject will likely bite it in the butt this time.While this strategy has worked for Apple in the past (I actually think Microsoft envies Apple here), Windows 7 represents a major change on two interesting vectors: one positive and long overdue, and the other new, optional, and more risky. The first will likely change the game, and the second will need some deep thought if you are to avoid the related exposures.

With the launch of Windows 7, Apple starts playing catch-up. When the PC was created by IBM, Apple, and even Commodore, there was a subtle and significant change with regard to how security was handled. Previously, while there were generally third-party security offerings, the primary security role was carried by the operating system vendor, which, in most cases, was also the primary hardware vendor. But none of the desktop vendors seemed to think they needed to focus on this area because security got in the way of the user experience, and being difficult to use was the sure-fire way to become obsolete.

Commodore (and Atari) both expired, and as we exited the '90s, Apple was too focused on survival to care. Wt the same time, Windows was becoming a target for attacks that went beyond just doing damage and being very limited in scale to attacks focused on stealing information and identities. This decade, we are getting viruses like Conficker, which have the potential to do global damage and still target Windows -- but we are still short of actually having one of these catastrophic events. This is largely because the security ecosystem surrounding Windows has generally proved adequate to the task. However, when comparing the Mac to Windows, generally, you leave out the massive security ecosystem that surrounds Windows and simply focus on the OS; up until Windows 7, the OS fell short. Windows 7 and Microsoft's Change Along with Windows 7 will come a comprehensive security solution sourced from Microsoft for the first time since the birth of the PC. Most of this solution will be part of its Windows experience -- and it will come for free -- and it changes dramatically how we compare the two platforms. Once the OS vendor takes on the broad responsibility for security, then this must be factored in when we compare the two offerings. The threat will remain higher for Windows in terms of the amount of malware that targets it, but this change should make Apple the easier target. And with an increasing number of high-profile companies like Cisco using Macs, they will become a likely target, as well. Hardware Advantages One thing that seems to be consistently forgotten is how much more secure Windows hardware already is in many shops. Biometric readers and/or smart card readers are very common on Windows hardware, while they're virtually nonexistent on Macs. And there is no Apple equivalent of a TPM to handle trusted links or hardware-based encryption. Virtualization Problem There is one feature with Windows 7 that I worry about, and that is this new built-in Virtual Machine that business versions will get. Its intent is to enable faster migrations, but it comes with a built-in security exposure. In fact, I haven't seen a lot of discussion on why desktop virtualization may be a bad idea when it comes to security.

Now, under emulation you have one operating system; security software can run on that OS natively and protect the application running in emulation mode. The problem is not all programs will run this way, which is why this virtualization option was built into Windows 7.

However, with emulation you are basically running another operating system instance, and this instance isn't compatible (which is why you are running it in emulation in the first place) with the primary OS. So how is it being protected? As we know, antimalware products have to be written for the OS on which they run. So an antivirus product written for Windows 7 or Vista probably won't run on Windows XP, if you can even get it to load twice. That suggests you will need to run two antimalware solutions -- one for the Windows 7 environment, and one for the Windows XP instance running on the Virtual Machine. These two products probably not only won't talk to each other, they may view the behavior of the other product as an attack or kick off scans at the same time -- bringing the system to its knees, or possibly even overwriting each other's files. Finally, and malware products aside, there is something inherently risky with regard to putting things that are probably no longer patched or tightly supported on desktop hardware. These applications would seem to be obvious targets for attack and, because they aren't touched at all, the resultant information flow to the attacker could go unnoticed for years.

In other words, if I can trick a user or an IT technician to install my malware into those VMs, I probable have a data mine that I can rely on for years. This makes me nervous enough to suggest that you don't deploy the virtualization option unless the related exposure is fully vetted. Will Windows 7 Be More Secure Than Snow Leopard? It will because it has to be. With the launch of Windows 7, Macs will be targeted much more often, and Apple's policy of concealing the related exposures has the potential to result in a major news story. But it's our job to protect users and make sure all of this wonderful stuff is working safely. With Windows 7, our job generally gets easier -- and the Mac guys will have to sweat, for once.

-- Rob Enderle is president and founder of Enderle Group. Special to Dark Reading.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...