Home Open Sauce Microsoft PR machine in bid to make Windows appear safe

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Microsoft PR machine in bid to make Windows appear safe

For some reason that is difficult to fathom, Microsoft has suddenly wheeled out its PR spinners to try and paint Windows — yes, the bug-ridden operating system that earned the company the epithet Typhoid Mary of the Internet — as something that top-notch experts are securing against attack.

The publication to run this fiction was Wired, long one of those august organisations that feeds the schlock machine. When I saw the headline — The elite Microsoft hacker team that keeps Windows PCs safe — I almost choked on my morning coffee.

The spiel that is being spouted is that Microsoft has got ace hackers probing Windows to find vulnerabilities so that you, gentle reader, can rest easy and not worry.

Take it from one who has been following this company for at least the last 25 years: even if every security expert on the planet was probing Windows for defects 24 hours a day for years on end, they would not be able to fix its issues. It is something like Swiss cheese – can anyone plug all the holes?

The facts mitigate against the kind of spin that Wired has swallowed. On the second Tuesday of every month, Microsoft issues security bulletins about the various defects in its products. It has become such a predictable confession list that very few people bother to report it anymore.

Microsoft has made the list of vulnerabilities that much more difficult to read, but it needn't have bothered. Much in the same way that one would not report that the sun rose in the East this morning, one does not bother with the Microsoft vulnerabilities anymore. They are there, in big numbers, and if you continue to use Windows, then you are playing with fire.

Windows has design defects in it too, that make the operating system ridiculously easy to exploit and the company isn't interested in fixing those issues.

Given these facts, if any journalist is going to write about how Microsoft looks after Windows security, then please write a novel. A work of fiction. Else, you end up looking like a stenographer.

Here's something which I wrote 13 years ago. The tone of the article which I criticised was similar to the one in Wired, a clueless exercise in spin by someone who clearly has swallowed the Kool Aid from Redmond.

Windows and security do not fit in the same sentence and not even in the same book. The sooner people learn that, the better for all concerned.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications