New code makes Windows 7 vulnerable to hackers

Hackers will target new features in Windows 7 that are not present in Vista or XP, according to security researchers.

hacker

Windows 7 will open up more opportunities for malware authors as they target flaws from the new nature of the operating system.

This was one of the predictions of security company Websense, which expected criminals to target new code in Windows 7 that was not present in Vista or XP.

In fact, Microsoft released patches for Windows 7 before it was even released.

In an interview with IT PRO, Carl Leonard of Websense said that any new software brought opportunities to malware authors, who would target version specific vulnerabilities in the code.

"There might be features in version 7 that don't exist on Vista or XP," he said. "There could be new user interface traits that malware authors may like to take a look at."

"We're expecting exploit code to target some of the code in Windows 7. Whenever you introduce new code there's always the likelihood of malware authors capitalising on it as much as they can."

Microsoft also adjusted the way that User Access Control worked, avoiding the way Vista allowed pop-ups every time a change was made to the system, which users found frustrating.

There are now four levels of User Access Control, and users who did not understand the reasons for deploying them could find themselves vulnerable if these were disabled.

Of course, Windows 7 could also be vulnerable to browser and plugin attacks, which no security control in Windows 7 could do anything about.

Leonard said: "As new versions of very popular software are made available, malware authors focus their attentions on those in order to push out code that are essentially zero-day attacks."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021

Most Popular

University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021