Vista Aims to Stop Hackers' Social Engineering PloysBy Matt Hines | Print
Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers
News Analysis: Microsoft maintains that by addressing the social aspect of IT attacks, the portion that can dupe even the smartest users into launching malware-laden attachments or clicking unknown URLs, Vista will improve PC security significantlyMicrosoft says the Windows operating system software is not the weakest link in desktop security, and contends that Windows Vista will help limit the greatest vulnerability of allusers' bad decision-making.
While previous iterations of Microsoft's dominant operating system hit the market with an abundance of security loopholes that left users open to many different forms of attack, Microsoft officials said new features offered in Vista will not only make it harder for malware writers attack the OS, but will also make it more difficult for users to hang themselves out to dry.
Executives pointed to Microsoft's SDL (Security Development Lifecycle) program as an attempt to root out many of the coding flaws that have left gaping security holes in previous versions of Windows during development, and said the primary thrust of the security tools added in Vista has been to help customers help themselves.
"The weakest link in the security of any system is the end user. It seems like we're putting them down, but, realistically, there's a lot we can do in technology to secure our products, but as long as user can be tricked into clicking a link or going to an unknown Web site, we're at risk," Fathi said. "We think that by helping users protect themselves better, we can make a big dent in the current methods of attacks being used by hackers."
Zero-day exploits and self-cloaking rootkits may be all the rage at the most complex end of the malware spectrum, but most users encounter PC security issues because they fall for social engineering tactics and make mistakes such as opening malware e-mails sent from spoofed domains of familiar sources and following links to Web pages that offer viruses and other attacks along with their advertised content, Fathi said.
UAC promises to help users prevent viruses from spreading within a machine by prompting the user to approve nearly every change to the system such a program might try to make. Whereas programs that tap into a machine's administrative controls to advance their reach largely operated in secret before Vista, users will now have the ability to shut the attacks down as they try to proliferate, Microsoft claims.
The anti-phishing technologies in IE 7 utilize onboard heuristics, as well as site-blocking capabilities based on traditional black- and whitelists, to give users an idea of the security status of every site they attempt to access. Known malware and phishing sites are automatically blocked, whereas every other site gets a red, yellow or green rating, based on the characteristics it exhibits to the browser.
Other security features integrated into Vista include Microsoft's Windows Defender spyware scanning and removal tool, and its BitDefender drive encryption system, which aims to help protect data in the case of stolen devices.
In the past, even users with great technical expertise or aggressive IT administrators looking out for them still often ended up falling for the most convincing forms of online fraud, but the additional layer of protection will stop most criminal efforts before malware can land on the desktop, according to Microsoft.
If users allow themselves to be drawn into a phishing site that has the browser flashing red around the edges, they should place much of the blame on themselves, not the operating system, Fathi said.
Some security vendors are already criticizing Vista's onboard security components, with anti-virus market leader Symantec calling UAC too chatty to have a significant impact on safety, predicting that users will come to ignore the many warnings the system produces. Since the volume and complexity of the UAC security warnings will overwhelm most users, and potentially leave enterprise IT administrators drowning in a sea of related help tickets, many users will simply opt to run with the system off, Symantec officials said.
In order to maximize the usefulness of UAC, Symantec said it is currently developing products that will manage UAC and the other Vista security tools to make them less obtrusive.
However, some experts say they believe the attempt to limit the social aspect of IT threats will strike many people as positive, useful and adequate. Lee Nicholls, global solutions director for consultant firm Getronics, said he believes that all but the most demanding customers will be encouraged by the work that Microsoft has done.
Part of Nicholls' job is helping to select the products that Getronics recommends to its customers, and he said the firm will encourage businesses to utilize Vista's onboard protections. Nicholls works at Microsoft's Redmond, Wash., campus, where he studies all of the software maker's latest technologies.
"We've seen all this technology provided for Windows before by third-party vendors, but customers were forced to figure out numerous processes for troubleshooting between applications, which created some additional security issues," Nicholls said. "Now all the management is there in the product, which makes it easier for end users, and for us, to try to solve problems as they arise."
While Getronics will continue to work with aftermarket security vendors and consider products such as Symantec's that promise to improve Vista's protections, he said that most users will be satisfied with the onboard tools, and that this may shift buying patterns when companies formulate their future IT security budgets.
"At the client security level, I honestly believe that Vista will probably provide enough protection for most companies to feel sufficiently safe, and move away from traditional third-party tools," Nicholls said. "This will encourage companies to spend more money on their perimeter solutions as client security becomes less of an issue; whereas before companies spent a lot of time and money integrating anti-virus, with Vista they can shift their focus to adding security services at the edge of their operations."
Even analysts who have been critical of Vista's security features during their development said the IT market landscape will change as a result of all the work Microsoft has done.
Andrew Jaquith, an analyst for Yankee Group Research, said UAC and other features may be seen as an obstruction by some users, but he believes that anti-virus software makers and other vendors will need to rethink their own product strategies as a result of Vista.
"Obviously there will still be a lot of opportunities for third-party companies to make improvements to the security capabilities in Vista, and to lend additional tools that Microsoft hasn't yet included in the OS," he said. "But I think these third parties should focus on building those products that help, instead of nitpicking what Microsoft has already done; the Vista world will be very different for Windows users and for the security industry, it's new footing for everyone."