This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Microsoft states that Windows is secure, as industry claims that security problems lie across all operating systems

Share this article:

Microsoft has responded to rumours that Google plans to stop using its products.

Writing in a blog post, Brandon LeBlanc, a Windows communications manager at the company, commented on the ‘coverage overnight about the security of Windows and whether or not one particular company is reducing its use'.

Pointing the finger at Google, LeBlanc referred to a story from Mashable where it was reported that Yale University had halted their move to Gmail (and their move to Google's Google Apps for Education package) citing both security and privacy concerns.

He said: “When it comes to security, even hackers admit we're doing a better job making our products more secure than anyone else. And it's not just the hackers; third party influentials and industry leaders like Cisco tell us regularly that our focus and investment continues to surpass others.”

Dave Marcus, director of McAfee Labs security research communications, said that claims that removing Windows will solve all the problems and help prevent attacks such as Operation Aurora are shortsighted, as the objection is not even close to the real issue.

He said: “Sure, the attackers used a very effective zero-day vulnerability and certainly they used lots of evasion techniques in delivering the payload. But the real vulnerability has not been discussed. People were the weak link.

“The attackers who launched Operation Aurora knew their targets well from both corporate and personal viewpoints. They knew what their victims were running and what their roles were. The attackers even knew what application versions they used.

“Would it make any difference if the victims were running Linux or any other operating system if an attacker builds such a sophisticated profile? Not remotely. Linux, Windows, Mac, whatever - everything has weaknesses. Especially the users of those systems.”

He commented that when an attacker knows the details of a company's technical deployment and personnel to the level we saw in Operation Aurora, the difference between one operating system and another is irrelevant as any system or network can be technically compromised. Likewise, malware can be written for any operating system.

Mickey Boodaei, CEO of Trusteer, said that Google's decision to drop use of Microsoft for security reasons may lead other enterprises to follow this practice, and adopting this will not improve their defences against targeted attacks.

He said: “Enterprises that are considering shifting to an operating system like Mac or Linux should realise that although there are less malware programs available against these platforms, the shift will not solve the targeted attacks problem and may even make it worse.

“Mac and Linux are not more secure than Windows. They're less targeted. There is a big difference. If you choose a less targeted platform then there is less of a chance of getting infected with standard viruses and Trojans that are not targeting you specifically. This could be an effective way of reducing infection rates for companies that suffer frequent infections.”

He also claimed that the security community is years behind when it comes to security products for Mac and Linux, and there is much less chance that any security product will be able to effectively detect and block an attack on other operating systems.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.