Windows security even more in question

Microsoft Surface

Microsoft's Windows operating system security has always been in the spotlight, but now even more thanks to a group of harckers called Shadow Brokers, who announced that they had accessed the NSA documents and from them have been able to extract valuable information and tools used by the spy agency North American. Among these tools, some to spy on Windows systems.

Microsoft has had to come to the fore before these announcements and clarify that they will study the situation to know how to act for the benefit of their clients ... We have already experienced this on other occasions, how certain attack tools of this type of agencies are sold on the deep web, and now, after these attempts For sale, they have published their code on the famous GitHub portal so that everyone can have access to these tools to compromise Windows security.

The tools obtained not only affect Windows, but also the SWIFT banking systems that are used to transfer money internationally. Although many of the tools and exploits are already detectable by current security tools, some may still affect old or unknown vulnerabilities in Windows. Therefore the thing can be serious.

Microsoft has made some somewhat stupid statements. On the one hand, it has denied that this publication affects its users, claiming that the techniques of the National Security Agency do not affect Windows. Nothing is further from the truth, but anyway ... On the other hand, Phillip Misner, the security manager of the Redmond company claimed that they are already developing defense plans on the 12 techniques described by Shadow Brokers ... So? If they don't affect Windows users, I wonder why they are developing that defense.

 


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

3 comments, leave yours

Leave a Comment

Your email address will not be published.

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Edward of the Port said

    Heh heh, these from MS, they look like the president of my country (Paraguay), ha ha ha ... In the same statement he is not able to be coherent ... It only contradicts itself ha ha ha ... In short, politics, it's politics (we already know all its tricks).

  2.   jorss said

    use free software the solution

  3.   Juan said

    Well, this can happen in any computer system, of course, but in a BSD or linux it is 100 times more secure, I feel very safe with OpenSUSE, I would feel = with fedora, ubunto, Debian etcc ... Or any Bsd, I just use windows for some game and without internet.