Skip to main content

Vista Security Battle Escalates

The verbal battle between software giant Microsoft and third-party security vendors like Symantec and McAfee continues to heat up. Although Microsoft recently announced it would provide developers ofthird party Windows security applications the necessary technical details to develop products for Windows Vista and avoid beingidentified as malware by Vista’s built-in safeguards, developer McAfee is characterizing Microsoft’s actions as "hollow assurances."

Symantec and McAfee are currently arguing that the information released to security vendors by Microsoft isn’t sufficient to develop full-featured security products. While developers can replacesecurity warnings with their own alerts, the material doesn’t provide access to Vista’s 64-bit kernel, which is protected by a new Microsoft security layer called PatchGuard.

For its part, Microsoft says it will provide security vendors will access to the 64-bit kernel when it issues a service pack for Windows Vista, but Microsoft has provided no data or timetable forsuch an update other than to say the details will be made available "in the months ahead." Vista is scheduled to ship to Microsoft business partners and volume license customers next monthand to consumers in January, 2007; Vista will include both 32-bit and 64-bit versions of the operating system on the same installation disks.

Delays in being able to access Vista’s 64-bit kernel mean security vendors will not be able to develop fully-featured third-party security products for Vista in time for the operating system’sconsumer launch, giving Microsoft a unique position in the marketplace for security products in the Windows ecosystem&mdash;and potentially running afoul of antitrust regulation in the EU, SouthKorea, or even the United States&mdash;although Microsoft has, for the time being, dodged EU scrutiny of Vista’s security technologies. Complicating things still further, Gartner security analystNeil McDonald has speculated it may be years before Microsoft enables security vendors to access the 64-bit kernel</a>."With antitrust concerns temporarily satisfied, Microsoft may feel less pressure to make kernel modifications quickly," wrote McDonald.

Enterprises, computing enthusiasts, and high-performance workstation users are expexted to be initial adopters of 64-bit versions of Windows Vista; as with Windows XP, consumers are expected to stickwith 32-bit versions of the operating system initially. However, lack of full-featured third-party security products may hamper adoption of 64-bit editions of Vista in the marketplace, in termsuppressing development of new software and hardware technologies looking to leverage the operating system’s larger address space.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
How to access the dark web safely and securely
1148276 autosave v1 tor dark web private browsing security

While accessing the dark web isn't necessarily wrong or illegal, it's important to know how to navigate this part of the internet safely. Accessing the dark web isn't like surfing the web everywhere else online. You need to take precautions.

In this guide, we'll show you what you need to know about how to access the dark web and how to keep yourself safe while you use it.

Read more
AMD and Apple face a dangerous new security flaw
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Researchers from cybersecurity firm Trail of Bits just found a vulnerability that affects some of the biggest brands in tech, namely Apple, AMD, and Qualcomm. The vulnerability, dubbed LeftoverLocals, affects graphics cards made by those companies. That makes it pretty widespread, with it affecting devices ranging from PCs and servers to tablets and smartphones. This flaw, if exploited, could allow attackers to access and steal data from vulnerable devices.

Normally, when working in a shared environment -- such as a workstation or a cloud computing infrastructure -- each user only has access to their own data and resources, even when working on the same hardware. However, LeftoverLocals bypasses these security measures and uses GPU memory to let potential attackers steal data from the other users on that same hardware.

Read more
How to find passwords on a Mac, MacBook, and Mac Mini
Passwords locked on Mac.

If you opt to use iCloud Keychain over one of the popular password managers, then you already know its major benefit: Your passwords sync across your Apple devices. For example, you can save a password on your iPhone and then access it on your Mac.

With the MacOS Monterey upgrade, Apple made it even easier to see saved passwords using System Preferences. For those who’ve decided not to upgrade to Monterey, though, you can still find your passwords with Safari. Let’s take a look at how to do both.
Getting started finding passwords on Mac
Reading the above, you probably realized one thing: To see passwords on your Mac, you'll need to know your Mac's keychain password. In other words, you need a password to find your passwords! So, be sure to know or locate your Mac's keychain password before getting started.

Read more