Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/8/2009
01:35 PM
Rob Enderle
Rob Enderle
Commentary
50%
50%

Windows 7 Will Mostly Be More Secure Than Leopard

Apple's Snow Leopard will be attacked more than any other version of the vendor's platform, and Apple's use of a s"ecurity by obscurity policy" where it does its very best not to actually talk in any depth about the subject will likely bite it in the butt this time.

Apple's Snow Leopard will be attacked more than any other version of the vendor's platform, and Apple's use of a s"ecurity by obscurity policy" where it does its very best not to actually talk in any depth about the subject will likely bite it in the butt this time.While this strategy has worked for Apple in the past (I actually think Microsoft envies Apple here), Windows 7 represents a major change on two interesting vectors: one positive and long overdue, and the other new, optional, and more risky. The first will likely change the game, and the second will need some deep thought if you are to avoid the related exposures.

With the launch of Windows 7, Apple starts playing catch-up. When the PC was created by IBM, Apple, and even Commodore, there was a subtle and significant change with regard to how security was handled. Previously, while there were generally third-party security offerings, the primary security role was carried by the operating system vendor, which, in most cases, was also the primary hardware vendor. But none of the desktop vendors seemed to think they needed to focus on this area because security got in the way of the user experience, and being difficult to use was the sure-fire way to become obsolete.

Commodore (and Atari) both expired, and as we exited the '90s, Apple was too focused on survival to care. Wt the same time, Windows was becoming a target for attacks that went beyond just doing damage and being very limited in scale to attacks focused on stealing information and identities. This decade, we are getting viruses like Conficker, which have the potential to do global damage and still target Windows -- but we are still short of actually having one of these catastrophic events. This is largely because the security ecosystem surrounding Windows has generally proved adequate to the task. However, when comparing the Mac to Windows, generally, you leave out the massive security ecosystem that surrounds Windows and simply focus on the OS; up until Windows 7, the OS fell short. Windows 7 and Microsoft's Change Along with Windows 7 will come a comprehensive security solution sourced from Microsoft for the first time since the birth of the PC. Most of this solution will be part of its Windows experience -- and it will come for free -- and it changes dramatically how we compare the two platforms. Once the OS vendor takes on the broad responsibility for security, then this must be factored in when we compare the two offerings. The threat will remain higher for Windows in terms of the amount of malware that targets it, but this change should make Apple the easier target. And with an increasing number of high-profile companies like Cisco using Macs, they will become a likely target, as well. Hardware Advantages One thing that seems to be consistently forgotten is how much more secure Windows hardware already is in many shops. Biometric readers and/or smart card readers are very common on Windows hardware, while they're virtually nonexistent on Macs. And there is no Apple equivalent of a TPM to handle trusted links or hardware-based encryption. Virtualization Problem There is one feature with Windows 7 that I worry about, and that is this new built-in Virtual Machine that business versions will get. Its intent is to enable faster migrations, but it comes with a built-in security exposure. In fact, I haven't seen a lot of discussion on why desktop virtualization may be a bad idea when it comes to security.

Now, under emulation you have one operating system; security software can run on that OS natively and protect the application running in emulation mode. The problem is not all programs will run this way, which is why this virtualization option was built into Windows 7.

However, with emulation you are basically running another operating system instance, and this instance isn't compatible (which is why you are running it in emulation in the first place) with the primary OS. So how is it being protected? As we know, antimalware products have to be written for the OS on which they run. So an antivirus product written for Windows 7 or Vista probably won't run on Windows XP, if you can even get it to load twice. That suggests you will need to run two antimalware solutions -- one for the Windows 7 environment, and one for the Windows XP instance running on the Virtual Machine. These two products probably not only won't talk to each other, they may view the behavior of the other product as an attack or kick off scans at the same time -- bringing the system to its knees, or possibly even overwriting each other's files. Finally, and malware products aside, there is something inherently risky with regard to putting things that are probably no longer patched or tightly supported on desktop hardware. These applications would seem to be obvious targets for attack and, because they aren't touched at all, the resultant information flow to the attacker could go unnoticed for years.

In other words, if I can trick a user or an IT technician to install my malware into those VMs, I probable have a data mine that I can rely on for years. This makes me nervous enough to suggest that you don't deploy the virtualization option unless the related exposure is fully vetted. Will Windows 7 Be More Secure Than Snow Leopard? It will because it has to be. With the launch of Windows 7, Macs will be targeted much more often, and Apple's policy of concealing the related exposures has the potential to result in a major news story. But it's our job to protect users and make sure all of this wonderful stuff is working safely. With Windows 7, our job generally gets easier -- and the Mac guys will have to sweat, for once.

-- Rob Enderle is president and founder of Enderle Group. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...