<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Ramblings while reading Microsoft&#8217;s Security Intelligence Report</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=1059" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=1059</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: kurt wismer</title>
		<link>http://spiresecurity.com/?p=1059&#038;cpage=1#comment-983</link>
		<dc:creator>kurt wismer</dc:creator>
		<pubDate>Mon, 16 Nov 2009 20:26:38 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1059#comment-983</guid>
		<description><![CDATA[&quot;page 8: “the most significant trend in 1H09 was the large increase in worm infections detected
in many countries and regions worldwide.” I wonder if this is due to more worms or better detection capabilities.&quot;

not sure, but i have long been predicting a renaissance for self-replicative malware - the economy of effort is just too tempting for the practice to stay out of favour.

 &quot;# page 9: “Computers in enterprise environments (those running Microsoft Forefront™ Client
Security) were much more likely to encounter worms during 1H09 than home computers
running Windows Live™ OneCare™.” Again I wonder if this is an anomaly of better detection techniques.
# page 9: Conficker is top threat with enterprises and not in top ten with consumers. Is this because Conficker targets enterprises or simply because consumers have many other threats that are well-controlled in enterprises?&quot;

one word - patching. enterprises are much less likely to leave automatic updates turned on. as a result vulnerabilities stay unpatched longer in those environments and worms exploiting those vulnerabilities spread better.

&quot;page 12: “Compromised servers acting as exploit servers can have massive reach; one exploit server can be responsible for hundreds of thousands of infected Web pages.” I would not have characterized the number of affected web pages on a single server as “reach”. Am I reading this wrong?&quot;

i wouldn&#039;t characterize it that way either. perhaps the affected webpage stat is to demonstrate *how* such a reach could be accomplished.]]></description>
		<content:encoded><![CDATA[<p>&#8220;page 8: “the most significant trend in 1H09 was the large increase in worm infections detected<br />
in many countries and regions worldwide.” I wonder if this is due to more worms or better detection capabilities.&#8221;</p>
<p>not sure, but i have long been predicting a renaissance for self-replicative malware &#8211; the economy of effort is just too tempting for the practice to stay out of favour.</p>
<p> &#8220;# page 9: “Computers in enterprise environments (those running Microsoft Forefront™ Client<br />
Security) were much more likely to encounter worms during 1H09 than home computers<br />
running Windows Live™ OneCare™.” Again I wonder if this is an anomaly of better detection techniques.<br />
# page 9: Conficker is top threat with enterprises and not in top ten with consumers. Is this because Conficker targets enterprises or simply because consumers have many other threats that are well-controlled in enterprises?&#8221;</p>
<p>one word &#8211; patching. enterprises are much less likely to leave automatic updates turned on. as a result vulnerabilities stay unpatched longer in those environments and worms exploiting those vulnerabilities spread better.</p>
<p>&#8220;page 12: “Compromised servers acting as exploit servers can have massive reach; one exploit server can be responsible for hundreds of thousands of infected Web pages.” I would not have characterized the number of affected web pages on a single server as “reach”. Am I reading this wrong?&#8221;</p>
<p>i wouldn&#8217;t characterize it that way either. perhaps the affected webpage stat is to demonstrate *how* such a reach could be accomplished.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
