- 10 Hot Big Data Startups to Watch
- 11 Unique Uses for Google Glass, Demonstrated by Celebs
- How to Export Your Google Reader Account
- How to Better Engage Millennials (and Why They Aren't Really so Different)
Computerworld - Microsoft today said it will deliver a record-tying 13 security updates on Tuesday to patch more than two dozen vulnerabilities in Windows and Office.
The company will ship a total of 13 updates next week, five of them pegged "critical," the highest threat ranking in its four-step scoring system. The 13 updates will tie the record from October 2009, when Microsoft issued the same number of bulletins, but fixed a total of 34 vulnerabilities . According to Jerry Bryant, a senior manager with the Microsoft Security Response Center (MSRC) , next week's updates will patch 26 flaws.
"A lot? That's an understatement," said Andrew Storms, director of security operations at nCircle Network Security. "But we could have had 14," he added, referring to the emergency Internet Explorer (IE) update Microsoft released two weeks ago. That "out-of-band" update was originally slated to be included in the collection set to ship this month.
Of the eight updates not marked critical, seven were ranked "important," the next-lower rating, while one was pegged "moderate." Eleven of the 13 will affect one or more editions of Windows; the remaining pair will affect Office XP and Office 2003 on Windows, and Office 2004 for Mac.
"What's kind of interesting this month is that there are fewer applications updates," said Storms, talking about the 11-to-2 ratio of Windows-to-Office security bulletins. The trend, Storms noted, has been the opposite: Microsoft applications, primarily Office and IE, have been extensively exploited by hackers, who have shied away from Windows itself because attacking applications has been easier.
That's not to say there isn't evidence of long-standing trends in the massive matrix that Microsoft spelled out in today's advance notification . One trend: Newer software is generally more secure than older software.
"We know that the newer operating systems are more secure," said Storms. "They use newer code, and were created with SDL [Security Development Lifecycle]," he added. SDL is Microsoft's term for a programming philosophy that bakes security awareness into all aspects of development. As proof, Storms pointed to Windows Server 2008 R2, the newest version of Microsoft's server software. "It has the least number of bulletins," he said.
Server 2008 R2 will be affected by 5 of the 11 Windows updates. Windows 7 , the newest client operating system, will be impacted by the same percentage, 45%, of the total. The eight-year-old Windows XP, meanwhile, will require 8 of the 11, or 73% of Windows updates, while the even older Windows 2000 will be affected by 9 of the 11, or 82% of the total.
"Every month, there's a new reason to get off the older operating systems, to get off the older applications," said Storms.
Storms was hesitant to delve deeply into the affected software matrix Microsoft published as part of its heads-up. "I'll need a Powerbar to do that," he joked. But the update Microsoft tapped as "Bulletin 1" caught his eye, nonetheless. That update ran counter to the norm, for it was rated critical for Windows XP, important for Vista, then back to critical for Windows 7. Because Vista and Windows 7 share a code base, vulnerabilities that affect them are almost always ranked identically.
Originally published on www.computerworld.com. Click here to read the original story.