News
Vista Security Debate Continues with Follow-Up Study
Security software vendor PC Tools on Friday fired the latest salvo in the
argument
over whether Windows Vista is as secure as Microsoft says it is.
The Sydney, Australia-based company even went so far as to release
early on Friday morning what it called "additional research" to support
its contention that Vista "is still a long way from immunity to online
threats."
"PC Tools maintain[s] that Vista is not immune from online threats,"
wrote Simon Clausen, chief executive of PC Tools, in an e-mail statement to
Redmondmag.com on Friday. "Further research and analysis has confirmed
our contention that additional third-party protection, even if it isn't our
products, is absolutely necessary for all Windows Vista users."
These latest comments from Clausen -- as well as those made
on Wednesday by PC Tools Vice President Michael Greene -- are a direct response
to a Windows Vista Security blog
posting by Microsoft staffer Austin Wilson that purported to debunk PC Tools'
findings.
For its part, PC Tools is now claiming that further examination of its raw data
and research methods indicate that 121,000 pieces of malware were detected on
about 58,000 Vista machines (this is according to data obtained by downloading
the malware count from the company's ThreatFire malware detection program).
Moreover, the follow-up study found that these same Vista computers "had
at least one piece of malware actively running on their system."
As for the types of malware detected on Vista-based machines, PC Tools said
17 percent of all the threats were Trojans, 5 percent were worms, 3 percent
were spyware and 2 percent were various viruses.
In the study's summary, PC Tools contended that Microsoft's Malicious Software
Removal Tool "is not a comprehensive anti-virus scanner" in that it sweeps away malware only for "a limited range of 'specific, prevalent
malicious software.'"
The company is also not too keen on Redmond's assertion this week that its
conclusions were not only inaccurate but were also not an indication of increased
vulnerabilities in Vista; rather, in the words of Microsoft evangelist and TechNet
blogger Michael Kleef, they were merely an indication of "poor user behavior."
"The number of virus infections found by a virus vendor does not necessarily
equal poor security," wrote Kleef in a blog
post. "If I, despite all prompting and consent behavior, choose to
go to a (probably dodgy) Web site, accept the ActiveX control prompts to download
(probably dodgy) code and I actually choose to execute that code, then I'm hosed.
I'm now at the mercy of whatever code I've chosen to run."
PC Tools' Clausen countered in his e-mail that "because the technology
we use to detect and identify malware is behavioral-based, the data refers to
threats that actually executed and triggered our behavioral detection on the
client machine."
Kleef wrote further: "It's not like the application developer community
didn't know about writing for least privilege. We made it pretty clear over
a number of years not to write to protected parts of the OS." Like many
Microsoft security personnel, Kleef invoked Vista's User Account Control (UAC)
component as a safeguard against most attacks.
Clausen said he had an answer for that, too: UAC's frequent intrusion alerts
tend to compel users to ignore the alert information and unwittingly let threats
slip through.
"UAC is limited in the number of activities it monitors because malware
can also penetrate the operating system by evading detection," Clausen
added.
While the banter between Vista security detractors and Microsoft continues,
IT pros can find solace in shoring up their firewalls and also patching
vulnerabilities that best fit the risk profile of their individual enterprise.
About the Author
Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.