|02 Jul 2010||#1|
| || |
Top Apps Largely Forgo Windows Security Protections
Many of the most widely used third-party software applications for Microsoft Windows do not take advantage of two major lines of defense built into the operating system that can help block attacks from hackers and viruses, according to research released today.
Attackers usually craft software exploits so that they write data or programs to very specific, static sections in the operating system’s memory. To counter this, Microsoft introduced with Windows Vista (and Windows 7) a feature called address space layout randomization or ASLR, which constantly moves these memory points to different positions. Another defensive feature called data execution prevention (DEP) — first introduced with Windows XP Service Pack 2 back in 2004 — attempts to make it so that even if an attacker succeeds in guessing the location of the memory point they’re seeking, the code placed there will not execute or run.
These protections are available to any applications built to run on top of the operation system. But according to a new analysis by software vulnerability management firm Secunia, half of the third party apps they looked at fail to leverage either feature.
Top Apps Largely Forgo Windows Security Protections — Krebs on Security
|My System Specs|
|Similar help and support threads for2: Top Apps Largely Forgo Windows Security Protections|
|protections against computer radiation?||General Discussion|
|Third-party apps: Bad news for security||Security News|
|Webmasters Largely Unresponsive to Infection Reports from Security....||Security News|
|Security Shootout:10 Top Antivirus Apps Put to the Test||System Security|
|Nearly 60 Percent Of Apps Fail First Security Test.||Security News|
|Security expert on Google Apps for Los Angeles: ....||Chillout Room|
|Popular Apps with Critical Security Vulnerabilities||System Security|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 12:20 PM.