Feeds

Microsoft Hack: Warned of weakness three months earlier

Some people just won't be told

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Microsoft knew about the weakness in its security three months before it was hacked, but failed to do anything about it, according to a speaker at the Compsec conference in London.

James Adams, CEO of iDefense, a computer security company, has said he warned the software giant about the vulnerability three months ago. "They could have closed the door," he said.

He was giving a keynote speech on the changing nature of war. He said that there had been a proliferation, matching the speed of the digital revolution, of conflict in the virtual space. He cited the LoveBug virus and the Microsoft hack as two prime examples of this conflict.

The Microsoft hack was accomplished by breaking through the firewall via a remote worker's machine and using this as a platform from which to launch the attacks, he said. Microsoft claims that no source code was compromised, but the debate rages on.

At the time of writing no one from Microsoft was able to confirm or deny the allegations. ®

Related Stories

MIcrosoft's choice: Law or Order
Register story inspire FBI raid on student
How you hack into Microsoft: A step by step guide
Redmond strives to cram great MS hack back in box
MS hacked! Russian mafia swipes WinME source?

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.