• Microsoft scoops up rootkit finder Komoku

    The start-up's rootkit detection technology will be added into Microsoft's Windows Live OneCare and Forefront security products.

    http://www.news.com/8301-13860_3-9899808-56.html?part=rss&subj=news&tag=2547-1_3-0-5

    Urs

     

  • Spyware authors offer dollars for downloads

    Spyware authors are offering financial rewards to botnet operators and other cyber-criminals who covertly install their spyware, security experts warned today.

    http://www.vnunet.com/vnunet/news/2212403/spyware-authors-offer-dollars

    Urs

     

     

  • IBM: Apple Crumble @ Blackhat

    In addition to my previous blog post: http://blogs.technet.com/ms_schweiz_security_blog/archive/2008/03/29/black-hat-who-patches-security-holes-faster-microsoft-or-apple.aspx

    From IBM Internet Security Systems:
    http://blogs.iss.net/archive/AppleCrumble.html

    The highlight of the day was the presentation given by Stefan Frei and Bernard Tellenback titled “0-day Patch – Exposing Vendors (In)Security Performance” covering their analysis of several years of vulnerability disclosures and patching processes from various vendors, and a detailed dissection of Apple’s and Microsoft’s performance. 

    In essence, with their “0-day Patch” metrics, they managed to show just how far Apple is trailing Microsoft in security patch responsiveness – in fact, after inspecting their graphs, Apple appears to be trending entirely in the wrong direction; more vulnerabilities, longer patching times, more 0-days, etc. – not the sort of thing we expect from a well known software vendor.

    Not entirely unrelated to this: Gone in 2 minutes: Mac gets hacked first in contest
    It may be the quickest $10,000 Charlie Miller ever earned. He took the first of three laptop computers -- and a $10,000 cash prize -- Thursday after breaking into a MacBook Air at the CanSecWest security conference's PWN 2 OWN hacking contest.

    Urs

     

  • Black Hat: Who patches security holes faster, Microsoft or Apple?

    Apple's teasing commercials that imply its software is safer than Microsoft's may not quite match the facts, according to new research revealed at the Black Hat conference on Thursday.

    Researchers from the Swiss Federal Institute of Technology looked at how many times over the past six years the two vendors were able to have a patch available on the day a vulnerability became publicly known, which they call the 0-day patch rate.

    They analyzed 658 vulnerabilities affecting Microsoft products and 738 affecting Apple. They looked at only high- and medium-risk bugs, according to the classification used by the National Vulnerability Database, said Stefan Frei, one of the researchers involved in the study.

    What they found is that, contrary to popular belief that Apple makes more secure products, Apple lags behind in patching.

    "Apple was below 20 [unpatched vulnerabilities at disclosure] consistently before 2005," Frei said. "Since then, they are very often above. So if you have Apple and compare it to Microsoft, the number of unpatched vulnerabilities are higher at Apple."

    It's generally good for vendors to have a software fix available when a vulnerability is disclosed, since hackers often try to find out where the problem is in order to write malicious software to hack a machine.

    For a vendor to have a patch ready when the bug is detailed in public, it needs to get prior information from either its security analysts or external ones. Otherwise the vendor has to hurry to create a patch, but that process can be lengthy, given the rigorous testing needed to test the patch to ensure it does not conflict with other software.

    Apple only started patching 0-day vulnerabilities in late 2003, Frei said.

    "We think that Apple had fewer vulnerabilities early on, and they were just surprised or not as ready or not as attentive," Frei said. "It looks like Microsoft had good relationships earlier with the security community."

    Over the past few years, Microsoft has tried to cultivate a closer relationship with the security community in order to encourage researchers to give it a heads-up about software problems. Apple, however, doesn't appear to have that same sort of engagement yet, and, "based on our findings, this is hurting them," Frei said.

    Curiously, both vendors' abilities to have 0-day patches ready at disclosure seemed to dip in the six months before a major product release. That trend was most pronounced in 2004 and 2005. Frei theorized that the buildup to big software releases took away software engineering resources.

    Andrew Cushman, director of Microsoft's Security and Research, said he couldn't pinpoint what might cause that trend. But in 2004 and 2005, Microsoft had a rash of vulnerabilities pop up in its Office products that it did not get advance notice of, which may have contributed to a higher percentage of unpatched publicly disclosed bugs.

    However, the study proved to be such a glowing affirmation of Microsoft's increased focus on security in the past few years that it prompted Cushman to ask Frei, "Did Microsoft fund this research?"

    "This is independent academic research," Frei replied...

    See the full study: http://www.techzoom.net/papers/blackhat_0day_patch_2008.pdf

    Urs

     

  • Sun and Apple Updates – A Sheer Nuisance!!

    From Roger's blog post:
    http://blogs.technet.com/rhalbheer/archive/2008/03/19/sun-and-apple-update-a-sheer-nuisance.aspx
    http://blogs.technet.com/rhalbheer/archive/2008/03/25/sun-and-apple-updates-a-sheer-nuisance-part-2.aspx

    Well, a little bit in the same direction as my previus post:
    http://blogs.technet.com/ms_schweiz_security_blog/archive/2008/03/26/linux-web-servers-broken-into-most-often.aspx

    Urs