238
top 42 comments
sorted by: hot top controversial new old
[-] NeoNachtwaechter@lemmy.world 64 points 2 months ago

And next time facebook hosts a summit about data privacy.

/s

[-] ImplyingImplications@lemmy.ca 35 points 2 months ago
[-] WhatAmLemmy@lemmy.world 3 points 2 months ago* (last edited 2 months ago)

The funny part is people still believe the UN represents peace and freedom, instead of the financial interests of the wealthiest countries and oligarchs.

[-] corsicanguppy@lemmy.ca 7 points 2 months ago

The funny part is

.. that edgelords think people want to hear about how the UN is doing now, instead of working toward what it needs to be.

[-] jaybone@lemmy.world -5 points 2 months ago

I don’t think you need the slash s there. It’s confusing.

[-] jordanlund@lemmy.world 40 points 2 months ago

Less concerned about Crowdstrike since it's not their product.

More concerned about Copilot:

https://www.wired.com/story/microsoft-copilot-phishing-data-extraction/

[-] Womble@lemmy.world 13 points 2 months ago

That seems a bit of a non-story given that its prefaced on "once the attacker has access to your work email". Yes once they have that they can do very good spear phishing attacks using copilot, but they could easily do them without copilot too.

[-] n3cr0@lemmy.world 23 points 2 months ago

This 3rd party software company fucked up and M$oft get the pressure, so they act like they are responsible.

Even the customers fucked up by using a vital piece of software where they cannot test the updates before rollout.

[-] bhamlin@lemmy.world 12 points 2 months ago

Right? I wish they'd respond like this when they themselves fuck up.

[-] geekwithsoul@lemm.ee 8 points 2 months ago

A third party vendor whose entire business model is predicated on the fact that security is such an afterthought at Microsoft that enterprise customers need to resort to this kind of crap for a bare minimum of security.

[-] IsThisAnAI@lemmy.world -1 points 2 months ago

🙄 because FOSS never has any serious cve and malicious code.

[-] geekwithsoul@lemm.ee 5 points 2 months ago

Never said it didn’t. Doesn’t change the fact that Microsoft is notoriously worse by every metric and because of its position in the market is far more potentially damaging. Almost like if you sell an OS as something that can be trusted to run mission critical applications, you probably shouldn’t phone it in when it comes to securing that OS.

[-] deegeese@sopuli.xyz 6 points 2 months ago

This is also MS’s fault because they never provided a proper API for security products like MacOS, so they end up having to run them all inside the kernel.

The reason for this omission was to give a competitive advantage to their own security products while also being cheaper.

[-] corsicanguppy@lemmy.ca 0 points 2 months ago

This 3rd party software company fucked up

NO.

Clowntrike didn't fuck up. They offered an externally-managed service that people allowed into their network because they didn't really clue in how monumentally stupid this is. You're blaming the gas station for blowing up your car or the leopards for eating your face. Customers who actually gave them money - the people who struggle with "that's hot, so don't touch it" - are a dime a dozen, and clowntrike was just taking advantage of the stupid. This has been the American way since snake oil salesmen during the gold rush.

We fucked up by not watching our stupider techbro friends better suited to a ward somewhere than a c-suite job. We should have been ridiculing them mercilessly so their shame would make them choose better.

[-] WeirdGoesPro@lemmy.dbzer0.com 20 points 2 months ago

Your PC ran into a problem that Microsoft couldn’t handle.

[-] emax_gomax@lemmy.world 15 points 2 months ago

Didn't 5h3y just release an update that bricked dual boot installs. Something tells me someone else should be organising this. Someone that actually cares.

[-] Defaced@lemmy.world 10 points 2 months ago

So are they going to reassess the capability of kernel level drivers like crowdstrike and anticheat solutions like vanguard? Because of they keep this capability open then they're just asking for another fuck up.

[-] billbasher@lemmy.world 8 points 2 months ago

They had better bring up that Secure Boot f up too

[-] mlg@lemmy.world 6 points 2 months ago

Reminds me of solarwinds doing security seminars after getting breached lol

[-] werefreeatlast@lemmy.world 5 points 2 months ago* (last edited 2 months ago)

Do not use windows or Microsoft solutions. That's security rule #1.

For that to work, the hardware vendors should sell hardware that has opensource code that is easily corrected if there's a security or other type of problem. For that to happen, Microsoft and other such companies need to stop monopolizing technologies. The government should make some changes to their parenting system. For example it should be illegal for companies to force their scientists and engineers to sell their patents automatically to the company. Instead only human people who can invent things should be the owners of the things they invent. If a company wants to keep a hold on that tech, keep the people who invented it happy. Let them own their tech so they can decide to sell it, trade it or make it free. Make it such that only people and not corporations can actually own the patents. Inquire and investigate companies that don't follow the rules.

[-] xavier666@lemm.ee 2 points 2 months ago

it should be illegal for companies to force their scientists and engineers to sell their parents automatically to the company

It's already illegal

/jk

patents*

[-] werefreeatlast@lemmy.world 3 points 2 months ago

Wait a minute! It should be illegal to sell their parents for sure! I've never sold my parents either!

[-] corsicanguppy@lemmy.ca 4 points 2 months ago

ClownTrike: allows people to let leopards eat their face

Microsoft: "Fucking casual. Hold my zune, watch and learn"

I'm not worried: Outlook will cack halfway through sending the iCal invites, which are probably not even valid format anyway.

[-] muntedcrocodile@lemm.ee 4 points 2 months ago
[-] lud@lemm.ee 8 points 2 months ago

Microsoft didn't cause the "disaster" though.

[-] WeirdGoesPro@lemmy.dbzer0.com 3 points 2 months ago* (last edited 2 months ago)

They just made the poor decisions that made CrowdStrike required in the first place.

[-] db2@lemmy.world 2 points 2 months ago

It exists on OSX and Linux too, they just don't do the thing that took down Windows so they weren't impacted.

[-] WeirdGoesPro@lemmy.dbzer0.com 3 points 2 months ago* (last edited 2 months ago)

Existing and being necessary are two different things. Linux and MacOS are operating systems. Windows is an ad delivery system that masquerades as an operating system.

[-] lud@lemm.ee 1 points 2 months ago
[-] WeirdGoesPro@lemmy.dbzer0.com 8 points 2 months ago

If Windows had better security and update practices, software like CrowdStrike wouldn’t be a necessity.

[-] lud@lemm.ee 1 points 2 months ago

If windows were absolutely perfect with no flaws whatsoever, CrowdStrike wouldn’t be a necessity. I agree with that.

Unfortunately we live in the real world and no OS is perfect so software like CrowdStrike exists on lots of operating systems.

Btw, Crowdstrike isn't necessary but it's very nice to have for companies. You don't need real time protection like that on a normal client you use at home.

[-] deegeese@sopuli.xyz 1 points 2 months ago

Running security products in kernel mode is precisely what caused this disaster.

[-] lud@lemm.ee 1 points 2 months ago

It needs that kind of access to fight advanced attacks. It would surprise me if similar EDR programs didn't have similar access on Linux systems, for example.

[-] deegeese@sopuli.xyz 1 points 2 months ago

No, you make a management API for security products that run in user space as root, you don't use kernel modules.

[-] lud@lemm.ee 1 points 2 months ago

Is that the way that EDR is implemented on Linux or are you guessing?

[-] progandy@feddit.org 1 points 2 months ago* (last edited 2 months ago)

Currently, cloudstrike offers two methods for Linux: a kernel driver / module and a theoretically safer alternative using epbf (you could call that "kernel level scripting"). Ironically, they triggered a kernel bug using that second option. They did not test all kernels they listed as compatible or something like that.

[-] RangerJosie@lemmy.world 0 points 2 months ago

Don't they have an easily hacked screenshot collecting bit of Bloat/Spyware they're desperately trying to get everyone to use?

[-] Vince@lemmy.world 1 points 2 months ago

Sounds like something they should talk about in some kind of summit about security

this post was submitted on 24 Aug 2024
238 points (97.2% liked)

Technology

59038 readers
4107 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS