What Spooks Microsoft's Chief Security Advisor 136
alphadogg writes "Microsoft's U.S. general manager/chief security advisor for its National Security Team, Bret Arsenault, thinks like a true security professional. In every bit of good news, he wonders what bad news could be coming. Application security, virtualization security and the fact that over half of computer attacks seen by Microsoft come from the .edu domain are just some of the things keeping him up at night."
students sharpening their pens (Score:5, Informative)
nothing to worry just students testing their scripts against big bad microsoft
Re:students sharpening their pens (Score:4, Interesting)
Re: (Score:3, Insightful)
Re:students sharpening their pens (Score:5, Informative)
People who root boxes want upstream, so they can scan for more boxes to hack, ddos things or distribute malware. They typically have very little need for downstream bandwidth to the compromised boxes.
Re: (Score:1)
[1] This knowledge comes from unofficial sources inside of AT&T
Re: (Score:1)
Huh? My FIOS is 5Mbps down and only 2Mbps up. If I upgrade, I get 15Mbps down but still only 2Mbps up.
Or is this an undocumented feature in FIOS? (I never really bothered to test, even a 5Mbps bandwidth is almost never an issue for me).
Re: (Score:1)
Re: (Score:3, Funny)
There's a lot of home users out there running non-admined MS boxes.
never underestimate the bandwidth of a truckload of pipes...
Re: (Score:1)
Re: (Score:2)
BWAHAHAHAHAHAHA!
Re: (Score:2)
Re: (Score:2)
(sigh) It makes the T1 line at the office seem *realy* slow now.
OTOH, the T1 line at the office is about 99.98% reliable over the course of a year (roughly 2 hours per year of downtime). My cable line is more like 99.5% (about 3 hours of downtime per month).
Coolest name for a security expert, EVER. (Score:3, Funny)
Did he legally change his name after he got hired? Other cool pseudo-names: Ima Baadash, Tod Newclierre, or John Wepunce.
Re: (Score:3, Interesting)
If he's at RSA this year, drop by the MS booth and say hi to him.
Re: (Score:1)
Re:students sharpening their pens (Score:5, Insightful)
Re:students sharpening their pens (Score:4, Interesting)
Re:students sharpening their pens (Score:5, Funny)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
You should try working for an ISP, where we have a gigabit pipe into the office... now, if I could only persuade IT support to get me a network card capable of keeping up with it
Re: (Score:1, Flamebait)
NOPE!
Totally PR brainwashed individuals learning from their propaganda bible, dreaming or living in a different reality!
Re: (Score:3, Insightful)
Big surprise? (Score:3, Insightful)
Actually, does this really surprise anyone? I think if you took away the botnets that might attack Microsoft, you might have
something more like 80%. Not that it was an attack, but I used to always use billy@microsoft.com as a return address when I was testing
e-mail or showing someone something.
Re: (Score:1, Interesting)
I'm sure there are plenty of students young and stupid like I was at the time.
Re: (Score:2)
Top five domains (number of spam messages delivered to me):
120
(Very simple statistics: just grepping the mail log for domain names. It doesn't include any host with no reverse DNS. And I don't get that much spam, as you can se
Re: (Score:1, Informative)
billg@microsoft.com would have been better.
Cleaner Version (Score:5, Informative)
Obligatory... (Score:1)
but seriously, thanks for the link.
fifty-fifty (Score:1)
What Spooks Microsoft's Chief Security Advisor ? (Score:2, Funny)
*rooted linux boxes, yes these are dangerous in wrong hands
*Russian business network
*chineese spammers
*prolonged multi gbit DDOS
Re: (Score:2)
Yes, but this is Microsoft's Cheif Security Advisor ...
This is slashdot ... the headline should read "What spooks Microsoft's Chief spook?"
The guys is an idiot (Score:3, Interesting)
Q&A (Score:5, Funny)
Answer: I think it would be a good idea.
Re: (Score:2)
Gandhi's Joke: Credit Where Credit's Due (Score:5, Informative)
Come now, give credit: Mahatma Gandhi...
Reporter: "Mr. Gandhi, What do you think of western civilization?"
Gandhi: "I think it would be a good idea!"
What Spooks Microsoft's Chief Security Advisor (Score:5, Funny)
Flying chairs?
Re: (Score:1)
Re: (Score:1)
What do you prefer? (Score:3, Insightful)
As a user of said computers/servers i much prefer a scripthappy student whimsing around my systems alerting me about security issues. What do worries me are govt founded hackers stealing sensitive information, research and other secrets leaving no n00b traces for me to discover. Its not the actual breakin that worries me but what the perpetrator do thats an issue. If someone breaks in but does no harm i can live with that. My feelings may get hurt but the company is ok atleast.
An application/OS vendor ofcourse prefer the stealth hacker since the student hacker brings into attention all the various security issues with their products and makes people look for other options. Many vendors prefer a company being hacked to pieces before letting an exploit being known publicly. Microsofts own exploit policy is a very telling sign of this. As long as an exploit isnt used extensively its not going to get patched regardless of how many systems are exploitable. That worries me at night...
Re: (Score:3, Insightful)
They are probably being used as jump boxes by hackers operating elsewhere, including those government sponsored ones.
Re: (Score:1)
Comment removed (Score:3, Interesting)
Re: (Score:1)
This Guy Doesn't Get Security (Score:3, Interesting)
Mind you, I wouldn't have expected anything less from Microsoft's Chief Security Advisor.
Re: (Score:2, Informative)
Who wouldn't want to stop attacks against their site? Half the attacks I see are sourced from Asia. The other half from US-based broadband connections. We buy BIG pipes, and my execs pay a lot of money for our provider to work with regional ISP's to filter attacks at the source.
Like it or not, he's right: attacks are becoming application-based. Mostly browser-based. The other end of that is socia
Computer Security what is a crime and what isn't? (Score:5, Insightful)
Mischief is the motivation of youth. Vandalism is a form of expression. We've all participated in it in some form, so everyone get off their high horse, and rather than "get tough on crime," its time to figure out the difference between kids having fun and serious criminals. It is also time to make computer systems in "the digital world" as resilient to mischief and vandalism as real physical buildings are in the real world.
We've all carved our names in a tree in a park. We've all stolen a pack of gum or something from a store. We've all done petty crimes when we were young. The difference in the digital world is that everything is so brittle and poorly built and the mischief that is expected from youth ends up costing companies [B|M]illions of dollars. In the classic movie, "War Games," a kid practically starts world war III, the analogy fits if you excuse the hyperbole.
From a societal point of view, we need to separate the smarts kids being mischievous from the criminals committing real harm, just like we do in the real world.
Re:Computer Security what is a crime and what isn' (Score:2, Insightful)
Mischief is the motivation of youth. Vandalism is a form of expression. We've all participated in it in some form, so everyone get off their high horse
Ahem.
Perhaps it is your horse that you should be dismounting from. Don't presume to speak on behalf of everyone else with regard to participation in unruly behaviors. Dipshit.
We've all stolen a pack of gum or something from a store.
ORLY??
Somebody owes me a free pack of gum, then. Apparently I missed "sticky finger day" when I was a kid.
we need to separate the smarts kids being mischievous from the criminals committing real harm
Your arrogance astounds me. You actually think that "mischievous" behavior and socially irresponsible law breaking is somehow correlated to "being smart". Wow.
Re:Computer Security what is a crime and what isn' (Score:5, Interesting)
Re: (Score:2)
See, kids who grow up poor get to see the injustice of the world first hand and, unlike adults, they feel the need to do something about it. Problem is, they're kids, so they can't.
Re: (Score:2)
Re: (Score:2)
Thankfully, we now live in an era where redistribution of wealth by force is not necessary to achieve social justice, unfortunately some people still see it as the only solution.
Re: (Score:2)
Re:Computer Security what is a crime and what isn' (Score:2)
Re: (Score:2)
Don't lose the point by being pedantic.
Re:Computer Security what is a crime and what isn' (Score:1)
Re: (Score:2)
Re: (Score:1)
This is exactly what I'm talking about. Equating serious crime with mischief. Vandalism is by no means the violent act that rape is.
My previous post was obviously not serious, but this is. I consider vandalism to be a "serious crime", in the meaning that yes, it is a crime in most (all?) places to destroy other people's property, and yes, any crime that effects other people in a non-trivial negative way is serious IMHO. How would you like it if someone spray painted your car or house, ripped up all the plants in your garden, or broke into your computer and did god-knows-what to it? And for clarification, no, this doesn't mean that I eq
Re:Computer Security what is a crime and what isn' (Score:4)
Putting a sticker on a street sign. Carving your name in a tree. Small mischievous things are far different than wholesale destruction.
This "zero tolerance" absolutist world we live in doesn't allow children to make mistakes or recover from bad judgment. One mistake and they want to bring the full force of law down on you.
Some transgressions should not be considered crime even though they share some similarity, and in some cases repercussions, as real crime. Kids have bad judgment, it is a fact and it is a flaw in human beings. We should seriously consider this during prosecution.
Re: (Score:2)
Re: (Score:1)
Your descriptions do not describe mere mischief, but harassment and intimidation.
So where/how do draw the line between on one hand "mere mischief", and on the other hand "harassment and intimidation"?
Putting a sticker on a street sign. Carving your name in a tree. Small mischievous things are far different than wholesale destruction.
Things like that make your neighborhood look like crap if enough people do it. There's a good Swedish saying than exemplifies this: "Många bäckar små bildar stor å." (Literal translation: "Many small brooks create a big river." Closest English saying I know of: "Many a little makes a mickle."/"Many a mickle makes a muckle.") I'm annoyed each time I get into the elevato
Re: (Score:2)
At this point in time I have a 16 year old son and a 2 year old daughter.
So where/how do draw the line between on one hand "mere mischief", and on the other hand "harassment and intimidation"?
That is the hard part, isn't it? The fact that it is not easy should not mean that we should abandon it.
I'm annoyed each time I get into the elevator in my house and see the increasing amount of stickers and scribble on the walls.
I agree will Bill Maher, if you are not annoyed every day, you are not living in
Re: (Score:3, Insightful)
Personally that's not my cup of tea, but it is pretty ignorant to label him as some kind of cheap moron and it is pretty daft to think that a top level manager at Microsoft is somehow a poor man.
Re: (Score:2)
I've grown out of the "must be capable of 180 and 0-60 in under 4secs attitude and now it's just a means of getting about.
Just because he doesn't share your (in my opinion juvenile) obsession in modes of transport doesn't mean he's underpaid
In fact given the general security level of MS products he's almost certainly overpaid
Re: (Score:2)
The MS chief security advisor drives a 1992 Toyota? Really? Two things come to mind here: Either Microsoft doesn't take security seriously enough to even give this guy a decent salary, or the urge to keep supporting outdated legacy crap is so ingrained at the company that even the guys at the top can't drop old tech for something better.
Of course it also makes me wonder, why can this guy take supporting a '92 car seriously, and yet the company he works for can't even make sure that the printer you bought last year will be supported in the latest OS?
Nobody said it was his only car. Maybe it's a pet project or something.
Masochist... (Score:2)
Security expert? (Score:2)
So either Microsoft's chief security advisor really thinks Red Hat is responsible for Linux security, and also thinks that security can be layered on in recent years rather than being a fundamental part of the core design starting from day one, or more likely his title should be "Marketing Advisor/Security Spin Specialist"
Re: (Score:2)
Even though an anonymous coward posted this, I can see how others might also be thinking along these lines. Of course, the US sends lots of athletes to the Olympics also, but it would be ludicrous to suggest that this means the US is responsible for the success of the Olympics. To extend the analogy, the AC also seems to miss the fact that Red Hat, while a long time participant in the Olympics, wasn't even a country when the Olympi
your own fault (Score:3, Interesting)
There's a simple solution: stop maintaining the fiction that one company and one operating system can do it all. If you want to be a vendor of high-uptime, high-reliability systems, concentrate on that market segment and stop marketing your systems to the mass market. On the other hand, if you want to be a vendor of flaky commodity operating systems, stop worrying about your systems not being secure and stop marketing them as such (oh, and run your own corporate operations on something that actually is secure).
Re: (Score:2)
opportunity knocks? (Score:4, Interesting)
Dell, Toshiba, HP, et el do not send that documentation along with a new machine when Vista is pre-installed. Could they be held accountable for people getting pwnd? Could this be an opening to get the M$ tax back when someone is forced to buy a machine with Vista on it?
Poor guy (Score:2)
It's been about three now since the last Windows system at home was converted to Linux. And we sleep just fine, thank you.
Re:Poor guy (Score:5, Funny)
Re: (Score:2, Funny)
Could it be? (Score:1, Flamebait)
Re: (Score:2)
What spooks me (Score:2, Insightful)
Re: (Score:3, Insightful)
Why is this not a bad thing? Simple due diligence/CYA. If I install a signed executable from a company and it causes a malware breach, then the damage done can be explained a
Re: (Score:1)
Re:Punishment needs to fit the crime (Score:4, Funny)
*listens in*
"If I only had a brain..."
10 years? (Score:4, Interesting)
I agree with punishment fitting the crime but I think you put too much value on the damage the cause. The simple fact is that too few of people take the required steps to protect themselves. People have locks on their homes and cars, they don't normally allow complete strangers inside, and most people won't give out personal information to complete strangers they meet. Yet when it comes to the net it seems as if all bets are off, you never know what they will do - other than it being stupid.
I am all for punishment, but damn, people put more value on things and animals than human life.
Re: (Score:1)
Re: (Score:1)
The error lies in the exploitable system that should be more secure. Hightening the sentences only takes away the bulk but really malicious people will still use them to get access to trade, state and research secrets. The faulty systems will continue to be computerized sw
Re: (Score:1)
Technically, the only way to really secure a system against trojans is to remove the ability to install software that doesn't come with the system from the factory. In other words, throw out the general-purpose computer and buy all hardwired appliances instead.
The problem with that is, programmability is a very useful feature.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
People exploring networks often do it for no reason other than to see what's there. They may use illegal means to do so, and they should be held responsible for that, but the fact is, a lot of grey
Re: (Score:2)
Re: (Score:1)
Though I wouldn't claim it is foolproof, it usually isn't hard to tell the difference in style of a malicious attacker and a harmless one- primarily because at one point or another, I have functioned in both capacities. If I hadn't done so, I wouldn't be qualified to do what I'm doing.
Yes, I do treat every breach like it was a serious one, and as my earlier post sta
Re: (Score:2)
Aww diddums. Perhaps we shouldn't punish kids when they chuck bricks through someones window either since that'll be just youthful exuberance right?
"it's just that the 'crime' of rooting some insecure corporate box and not doing anything particularly destructive or criminal (credit card fraud etc.) with it is just not what I'd consider a big deal"
Rooting around someones pr
Re:"...he wonders what bad news could be coming... (Score:2)
I see we're at that point in the orbit where the moderators totally lack a sense of humour again.
It was a joke, people. Get it? A joke.