Skip to main content

Microsoft

Windows 8 Bootkit Might Prove 'Secure Boot' Ineffective

posted onNovember 18, 2011
by l33tdawg

According to The Hacker News, Peter Kleissner, an independent programmer and security analyst, will show his findings which might prove that the highly advertised Secure Boot feature in Microsoft's latest operating system is not that reliable.

Kleissner is renowned worldwide after back in 2009, at the USA Black Hat conference, he presented the Stoned Bootkit, an MBR rootkit that was capable bypassing any encryption software that does not rely on hardware-based technologies.

Microsoft shareholders grumble at brief annual meet

posted onNovember 15, 2011
by l33tdawg

Microsoft Corp shareholders filed out of the software giant's annual meeting grumbling that they did not get to ask more questions in their once-a-year opportunity to quiz Chairman Bill Gates and CEO Steve Ballmer.

The gathering broke up with only a smattering of applause from 450 or so in attendance, while a handful of shareholders angrily shouted for more time to ask questions, after a strictly enforced 15 minutes.

RSA Extends Reach Of SecurID To Microsoft Cloud

posted onNovember 8, 2011
by l33tdawg

Microsoft has integrated RSA's SecurID multiple authentication technology with Active Directory Federation Services, which lets companies extend identity data from the directory service to the cloud.

While ADFS provides user name and password services, RSA's technology goes several steps further by adding another layer of user authentication by way of a hardware or software token that generates an identifying code every 60 seconds.

New zero-day Windows kernel vulnerability associated with Duqu Trojan

posted onNovember 2, 2011
by l33tdawg

In the continuing saga of the malware known as Duqu, CrySyS Lab at the Budapest University of Technology and Economics has announced it was able to acquire a copy of the "dropper" from one of the victims.

What is a dropper and what does this mean? A dropper is a term used by anti-virus researchers to denote a piece of code that is usually installed onto a computer to download further malicious components.