New code makes Windows 7 vulnerable to hackers

Hackers will target new features in Windows 7 that are not present in Vista or XP, according to security researchers.

hacker

Windows 7 will open up more opportunities for malware authors as they target flaws from the new nature of the operating system.

This was one of the predictions of security company Websense, which expected criminals to target new code in Windows 7 that was not present in Vista or XP.

Advertisement - Article continues below

In fact, Microsoft released patches for Windows 7 before it was even released.

In an interview with IT PRO, Carl Leonard of Websense said that any new software brought opportunities to malware authors, who would target version specific vulnerabilities in the code.

"There might be features in version 7 that don't exist on Vista or XP," he said. "There could be new user interface traits that malware authors may like to take a look at."

"We're expecting exploit code to target some of the code in Windows 7. Whenever you introduce new code there's always the likelihood of malware authors capitalising on it as much as they can."

Microsoft also adjusted the way that User Access Control worked, avoiding the way Vista allowed pop-ups every time a change was made to the system, which users found frustrating.

There are now four levels of User Access Control, and users who did not understand the reasons for deploying them could find themselves vulnerable if these were disabled.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Of course, Windows 7 could also be vulnerable to browser and plugin attacks, which no security control in Windows 7 could do anything about.

Leonard said: "As new versions of very popular software are made available, malware authors focus their attentions on those in order to push out code that are essentially zero-day attacks."

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now
Advertisement

Recommended

Malware attacks using machine identities doubled in 2019
cyber security

Malware attacks using machine identities doubled in 2019

4 Aug 2020
Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
Over two dozen Android apps found stealing user data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Virtualise Windows 7 under Windows 10
Microsoft Windows

Virtualise Windows 7 under Windows 10

5 Jul 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
UN report points to a 350% rise in phishing websites at start of 2020
phishing

UN report points to a 350% rise in phishing websites at start of 2020

7 Aug 2020