Roger Grimes takes an extensive, in-depth dive under the hood to explain the various features and components of Windows 7 security. Read all of the installments of Grimes’ three-part series on Windows 7 Security: What You Need to Know.
When you’re done with that, you can follow it up with a more general look at current security threats above and beyond Windows 7 by reading How to Stop 11 Hidden Security Threats.]]>
The problem is that Windows XP still accounts for nearly three-fourths of the operating system market. Windows 7 has been a huge success, and that success will continue throughout 2010, but not all regions of the world are likely to adopt the latest and greatest flagship PC operating system from Microsoft at the same rate and that will leave some regions more vulnerable than others.
Malware developers and cyber criminals are a lazy bunch and tend to take the path of least resistance. Regions that lag in adopting Windows 7 and continue to rely on Windows XP will offer attackers pockets of easy targets.
The most affected regions for the Conficker worm were Brazil, China, Russia, India, and Vietnam. F-Secure chief research officer Mikko Hypponen says “It’s likely that XP attacks will still be around for a number of years…The easy target will be these ghettos.”]]>
Even with advances in security like ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention, the addition of BitLocker-to-Go encryption for portable USB drives, and the more secure Web browsing experience provided by Internet Explorer 8 (combined with UAC which enables Internet Explorer Protected Mode), there is still some work to be done if Microsoft is looking for ideas for Windows 8.
Security experts from nCircle and Sophos contribute their thoughts about what Windows 7 got right and what still has room for improvement–namely the Windows Firewall, XP Mode virtualization, and hiding known file extensions by default.]]>