Won the AVTest award for Best Security Protection and Performance of 2013. Runs seamlessly in the background without compromising speed and performance. Leak of Windows 1. Source Code Raises Security Concerns. Microsoft has confirmed that a significant chunk of its source code for Windows 1. Beta. Archive. The exact size of the leak has been disputed, but the data reportedly comes from the Shared Source Kit that Microsoft distributes to trusted partners. Microsofts tall claim that no known ransomware will run on its Windows 1. S operating system has Read more Read. First reported by The Register and confirmed by Microsoft on Friday night, the leak contains source code to the base Windows 1. Redmonds Pn. P code, its USB and Wi Fi stacks, its storage drivers, and ARM specific One. Core kernel code. With that information, a hacker can hunt for vulnerabilities within some of the most trusted levels of the operating system. The code also reportedly contains the private debugging symbols that are normally stripped from public releases. These symbols give programmers extra information about which functions and data a piece of code is calling. The Register claimed the data dump was 3. TB large, but Beta. Archive tells The Verge that the source code was just 1. GB in size. Beta. Archive has removed files from its servers The Register posted screenshots for the sake of posterity. The Verge claims that a lot of the data has been around for a long time. The fact that Beta. Archive administrators say that they were not forced by Microsoft to remove the code could indicate that this leak is not as significant as it seems. But theres more for the software giant to worry about. The Register claims that its believed that the leak came from a breach of Microsofts in house system that occurred in March. Ars Technica confirms that it received unconfirmed accounts that the Microsoft build systems were indeed hacked that month. For Microsoft, this is another worrisome issue with cybersecurity following several months of recurring incidents. It comes right on the heels of the debunking of its claim that no known ransomware can run on Windows 1. S. The Register, Ars Technica, The Verge. Between the Lines ZDNet. Larry Dignan. Larry Dignan is Editor in Chief of ZDNet and Editorial Director of ZDNets sister site Tech. Republic. He was most recently Executive Editor of News and Blogs at ZDNet. Prior to that he was executive news editor at e. Noregistration upload of files up to 250MB. Not available in some countries. Eugene Kaspersky, CEO of Kaspersky Lab, participates in a panel discussion during day 3 of the 48th Munich Security Conference at Hotel Bayerischer Hof on February 5. Flagship ZDNet weblog, covering a broad range of technology news. Week and news editor at Baseline. He also served as the East Coast news editor and finance editor at CNET News. Larry has covered the technology and financial services industry since 1. Wall. Street. Week. Interctive Week, The New York Times, and Financial Planning magazine. Hes a graduate of the Columbia School of Journalism and the University of Delaware. Zack Whittaker. Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and Whats. App at 6. 46 7. 55 8. PGP fingerprint for email is 4. D0. E 9. 2F2 E3. 6A EC5. DAAE 5. D9. 7 CB8. C 1. 5FA EB6. C EEA5. Stephanie Condon. Stephanie Condon is a staff writer for CBS Interactive based in Portland, Oregon, covering business technology for ZDNet. She previously covered politics for CBSNews. CNET. Stephanie graduated with a B. A. in communication from Stanford University.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |