Microsoft: We'll help other vendors find, fix their bugs
But company stops short of promising to lend Windows Update to others
Computerworld - Microsoft Corp.'s security team will help third-party developers of Windows applications and add-ons find and fix bugs in their software, the company said today.
The program, dubbed Microsoft Vulnerability Research (MSVR), is a formalization of things the company currently does, not a brand-new initiative, said Andrew Cushman, the company's director of security response and outreach, from the Black Hat security conference.
"This is work we're already doing," he said. "We'll report vulnerabilities we find in third-party software, and we'll work with them to identify, resolve and mitigate those vulnerabilities."
Microsoft has, at times, gone public with work it has done in collaboration with other software vendors. One of the most recent examples was in May and June, when Microsoft worked with Apple Inc. on flaws in both its own Internet Explorer browser and Apple's Safari. Then, however, Microsoft took shots at its rival, telling users in one of its security advisories that they should stop using Apple's browser until it was fixed.
Earlier this year, Microsoft helped out Yahoo Inc. by issuing a "kill bit" update through its Windows Update service that disabled a buggy ActiveX control installed by Yahoo on PCs that played tunes purchased from its now-defunct online music store.
According to Cushman, Microsoft's security researchers will report bugs they find during their work to third-party developers, and coordinate their work to make sure that details of those vulnerabilities don't go public before a patch is in place. He also said Microsoft would help those third-party companies in other ways, but he was somewhat vague about the extent of that help.
When asked if Microsoft would enhance its Windows Update service so that it pushed third-party updates to Windows users, for example, he hesitated for several seconds before answering: "That's a hard question. We're always looking to provide the best experience for our customers, so we'll examine all aspects, including vulnerability identification, other mitigations and as a final link, detection and deployment.
"But I can't say we would use Windows Update."
Microsoft won't issue security advisories for third-party software as it does for its own programs, said Cushman. Instead, according to a follow-up fact sheet that the company's public relations firm provided, outside vendors will be given "the necessary information and assistance to develop an update to address the vulnerability."
Cushman said the move was in Microsoft's own interests, but he also argued that it would be a win for everyone. "Some may question [our motives], but this is for the good of customers and the enterprise, and it will help protect their environment of Microsoft [software] and other software as well.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
All Malware and Vulnerabilities White Papers |