Vista under the hackers' microscope
Microsoft has great confidence in the security features of its upcoming Vista OS. So much confidence, in fact, that it plans to show them off in a den of hackers. At the August Black Hat confab in Las Vegas, the software giant will take to the stage and offer an entire series of sessions on its long-awaited overhaul of the Windows operating system.
It will be the first presentation Microsoft has made at the hacker-oriented gathering. Microsoft security program manager Stephen Toulouse told eWeek that the idea is to provide deeply technical presentations on Vista security to the hacking community.
"We submitted several presentations to the Black Hat event organizers and, based on the technical merit and interest to the audience, they were accepted," Toulouse told eWeek.
John Lambert, group manager in Microsoft's Security Engineering and Communications Group, will also be on hand to discuss the security engineering process behind Vista. Specifically, he will show how Vista's engineering process differs from that of Windows XP, and he'll display new features designed to blunt memory overwrite flaws.
RSA stock option grants under scrutiny
Bedford, Mass.-based RSA Security Inc. acknowledged Tuesday that it has been subpoenaed by the U.S. Attorney for the Southern District of New York for records from 1996 to the present related to the company's granting of stock options.
The company told the Reuters
Last Friday RSA said it received notification of a shareholder complaint alleging violations from October 1999 to present of state and federal laws relating to stock option grant practices. The company said in a filing with the U.S. Securities and Exchange Commission that its directors intend to review the allegations before responding.
Shares in RSA dropped by 2.1% to $16.33 in Tuesday mid-day trading on the Nasdaq market.
Report shows spike in spyware
The spyware threat has grown steadily, according to a report from Chicago-based security software firm Aladdin Knowledge Systems Inc. Among the findings, which cover 2005:
The latter statistic covers email worms and file infectors defined as self-replicating/propagating malicious applications. Unlike Spyware and Trojan horses, viruses and worms have self-spreading capabilities, using email, networks, instant messengers and other programs to propagate.
This article originally appeared on SearchSecurity.com.