R
RayLopez99
Why did I not hear about this month old news from you security experts
when we had a rootkit discussion a few weeks ago? Rafter? Dave?
Because you did not know about it? What else don't you not know?
RL
http://www.zdnet.com/blog/bott/why-...o-make-windows-8-less-secure/4100?tag=nl.e539
Summary: Windows 8 isn’t even in beta yet, and already the FUD is
flying fast and furious. A small group of activists are whipping up
controversy over the UEFI secure boot feature even as they admit the
feature is “valuable and worthwhile.” Here’s the real story.
The FUD is flying fast and furious over Windows 8, and the OS isn’t
even in beta yet.
The Free Software Foundation (FSF) is organizing a petition-signing
campaign over Microsoft’s announced support for the secure boot
feature in next-generation PCs that use Unified Extensible Firmware
Interface (UEFI) as a replacement for the conventional PC BIOS. My
ZDNet colleague Steven J. Vaughan-Nichols is urging his readers to
sign the petition with a bit of deliberately inflammatory language,
calling it “UEFI caging.”
The crux of their argument is that Microsoft is deliberately requiring
a change in next-generation hardware that will make it impossible to
wipe off a Windows installation and install Linux. They are wrong, and
their effort to whip up public fury is misguided at best and cynical
at worst.
Allow me to illustrate by turning the argument around in an equally
cynical way, with an equally inflammatory rhetorical flourish:
People who make their living in the Linux ecosystem are demanding that
Microsoft disable a key security feature planned for Windows 8 so that
malware authors can continue to infect those PCs and drive their
owners to alternate operating systems.
Oh, wait. Now that I think about it, that’s actually pretty close to
the truth.
Here’s the reality. Malware authors are getting more creative and more
vicious. A rootkit that can infect key operating system files can hide
itself so thoroughly that it is virtually impossible to detect. The
TDL4 rootkit is probably the best known and most deadly of the bunch.
It can patch the Windows Boot Configuration Database, overwrite key
system modules, and disable driver signing requirements, just for
starters. It is a nightmare to clean up.
The secure boot feature pulls the rug out from under this rootkit and
everything like it. Those key boot files that the rootkit tampers with
are digitally signed. With Secure Boot enabled, any modification to
those files is detected at startup by the UEFI code-signing check, and
the system stops in its tracks. Rootkit foiled, user protected,
recovery possible.
when we had a rootkit discussion a few weeks ago? Rafter? Dave?
Because you did not know about it? What else don't you not know?
RL
http://www.zdnet.com/blog/bott/why-...o-make-windows-8-less-secure/4100?tag=nl.e539
Summary: Windows 8 isn’t even in beta yet, and already the FUD is
flying fast and furious. A small group of activists are whipping up
controversy over the UEFI secure boot feature even as they admit the
feature is “valuable and worthwhile.” Here’s the real story.
The FUD is flying fast and furious over Windows 8, and the OS isn’t
even in beta yet.
The Free Software Foundation (FSF) is organizing a petition-signing
campaign over Microsoft’s announced support for the secure boot
feature in next-generation PCs that use Unified Extensible Firmware
Interface (UEFI) as a replacement for the conventional PC BIOS. My
ZDNet colleague Steven J. Vaughan-Nichols is urging his readers to
sign the petition with a bit of deliberately inflammatory language,
calling it “UEFI caging.”
The crux of their argument is that Microsoft is deliberately requiring
a change in next-generation hardware that will make it impossible to
wipe off a Windows installation and install Linux. They are wrong, and
their effort to whip up public fury is misguided at best and cynical
at worst.
Allow me to illustrate by turning the argument around in an equally
cynical way, with an equally inflammatory rhetorical flourish:
People who make their living in the Linux ecosystem are demanding that
Microsoft disable a key security feature planned for Windows 8 so that
malware authors can continue to infect those PCs and drive their
owners to alternate operating systems.
Oh, wait. Now that I think about it, that’s actually pretty close to
the truth.
Here’s the reality. Malware authors are getting more creative and more
vicious. A rootkit that can infect key operating system files can hide
itself so thoroughly that it is virtually impossible to detect. The
TDL4 rootkit is probably the best known and most deadly of the bunch.
It can patch the Windows Boot Configuration Database, overwrite key
system modules, and disable driver signing requirements, just for
starters. It is a nightmare to clean up.
The secure boot feature pulls the rug out from under this rootkit and
everything like it. Those key boot files that the rootkit tampers with
are digitally signed. With Secure Boot enabled, any modification to
those files is detected at startup by the UEFI code-signing check, and
the system stops in its tracks. Rootkit foiled, user protected,
recovery possible.