Vulnerability

simple reasons as to why Windows Live sucks

I’ve started using my Microsoft Hotmail Windows Live account again, and it didn’t take a hard look to find 2 reasons why it is vastly inferior to Google Mail:

  1. Informations are passed on a transparent HTTP connection. Gmail uses encrypted HTTPS all session long.
  2. Windows Live allow me to search keywords in ONE message at a time. Gmail allows me to search keywords in the frickin’ thousands of email I have been getting since opening my account.

Way to go Microsoft, Bing! must be a big threat to Google if you’ve put the same attention to detail in developing it.

Update: last week, Microsoft reported that thousands of Hotmail accounts were exposed over a phishing attack. I know better than to click on an email link to log into my account, so it seems that many of those exposed accounts were used to corrupt the Hotmail network, including my own account. I got about 20 spam mail allegedly sent by contacts, and 10 mail sending failure notices to contacts from my Hotmail list. I proceeded to change my password, and it now seems that the Hotmail spam filter is temporarily disabled, letting all the junk mail reach my inbox. I’m sure this is prompting a lot of long time Hotmail users to move to a more serious provider like gMail or Yahoo.

Update: Turns out my vacation reply has somehow been activated, featured the same text I’ve seen on and on, and was set to reply to every incoming mail (which according to Microsoft makes me more vulnerable):

Dear friend,
how were you going? I would like to introduce you an really good space,there are mainly run various kinds of famous electornic products, it’s true charm pioneer.Now the company is under promotion, all of the products are sold nearly as the same as their cost.
Charmpioneer renders the best service to customers, and provides you with original products which are very cheap, but good-quality.
It is really a good opportunity for taking action, let’s go,just do it, and you will fall in love with it.

The web address: (www.)brcian.com

Update: Now I noticed that my contact list has completely dissapeared whenever I connect with an IM client.

Share

Bloatware
Cybercriminality
Data irresponsibility
Digital privacy
Economic sustainability
Encryption
Google
Internet
Messaging
Migration
Phishing
Security
Spam
Vulnerability

Comments (0)

Permalink

U.S. Department of Defense to teach migrating to open-source software

I have written about the United States National Security Agency contributing to information security (with its release of the SHA cryptographic hash functions) and a set of modifications that can be applied to Unix-like operating systems, such as Linux and BSD.

Now, the United States Defense Information Systems Agency (a division of the Department of Defense), has started running seminars on migrating to open-source software. That’s a pretty strong endorsement for open-source.

Read more on Cnet.com.

Share

Digital privacy
Economic sustainability
Encryption
Migration
Open
Security
Vulnerability

Comments (0)

Permalink

android and iPhone vulnerability compared

Kenneth Van Wyk wrote an article for itmanagement.earthweb.com in which he tried to assess the level of vulnerability of Google android and Apple Inc. iPhone OS.

I’m going to go out on a limb here and predict Google’s Android mobile phone platform is going to prove itself to be more secure than Apple’s iPhone in the long run.

Go to the article.

Share

Android
Digital privacy
Economic sustainability
Google
Internet
Mobile computing
OSX
Open
Operating system
Proprietary
Review
Security
Vulnerability
iPhone

Comments (0)

Permalink

First critical IE8 vulnerabilities given serious treatment

Just when it appeared Windows and its associated services were looking more stable month after month, Microsoft chose June to tackle a plethora of vulnerabilities including no fewer than 14 that its security engineers believe could be exploitable within the next 30 days.

Read the article at Betanews.com

Share

Bloatware
Bugs
Economic sustainability
Internet
Security
Vulnerability

Comments (0)

Permalink