{"id":81,"date":"2005-03-31T08:27:00","date_gmt":"2005-03-31T08:27:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm"},"modified":"2007-07-24T17:57:35","modified_gmt":"2007-07-24T16:57:35","slug":"spyware-re-enforces-need-for-network","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","title":{"rendered":"Spyware re-enforces the need for network segmentation and remediation"},"content":{"rendered":"<p><!--111225781537098945-->There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of <a href=\"http:\/\/www.microsoft.com\/athome\/security\/viruses\/virus101.mspx\">viruses, worms and Trojan horses<\/a>, but spyware is now a major problem too.<\/p>\n<p>Earlier this month, it was widely reported how a joint investigation by law enforcement agencies in Israel and the UK foiled <a href=\"http:\/\/news.zdnet.com\/2100-1009_22-5622794.html\">an attempt to use keystroke logging software to gain access codes in order to steal \u00c2\u00a3220 million from the Sumitomo Mitsui bank<\/a>. This is believed to be the first recorded incident of spyware being used for large scale online theft.<\/p>\n<p>For some time now, IT-savvy users have been checking for spyware with products such as <a href=\"http:\/\/www.safer-networking.org\/en\/\">Spybot Search and Destroy<\/a> or <a href=\"http:\/\/www.lavasoft.com\/\">Lavasoft Ad-Aware<\/a>. Then <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/microsoft-buys-giant-company.htm\">Microsoft bought the Giant Company<\/a> and soon afterwards released its <a href=\"http:\/\/www.microsoft.com\/athome\/security\/spyware\/software\/\">Windows AntiSpyware<\/a> beta product. According to <a href=\"http:\/\/www.itweek.co.uk\/\">IT Week<\/a>, the final release will be free for registered Windows users, but corporates will need to pay for the enterprise version of the product. Now Symantec has joined the spyware market with <a href=\"http:\/\/enterprisesecurity.symantec.com\/products\/products.cfm?ProductID=154\">Symantec Client Security v3.0<\/a> and <a href=\"http:\/\/enterprisesecurity.symantec.com\/products\/products.cfm?ProductID=155\">Symantec AntiVirus Corporate Edition 10<\/a>, both incorporating spyware detection and removal capabilities, whilst <a href=\"http:\/\/www.mcafeesecurity.com\/us\/products\/mcafee\/antivirus\/desktop\/vs_spyware.htm\">McAfee Anti-Spyware Enterprise<\/a> aims to block malware before it reaches the corporate network. Other vendors, such as <a href=\"http:\/\/www.websense.com\/\">Websense<\/a>, have added malware detection to their products but there is still a gaping hole in many organisation&#8217;s IT strategy &#8211; mobile users returning to the network.<\/p>\n<p>Whilst many corporates will specificly ban consultants and other suppliers from connecting non-managed PCs to their network, some don&#8217;t &#8211; and in any case that is still only half the issue &#8211; what about the user who takes their laptop on the train or to the airport and connects to a wireless hotspot, or even to a less-regulated business partner&#8217;s network, then returns to the &#8220;safe&#8221; corporate LAN with who-knows-what malware on their PC? It may sound paranoid, but when I started to use anti-spyware products a couple of years back I was amazed how much rubbish had infected my work PC and I am just one user on a large network.<\/p>\n<p>According to IT Week, in a survey of 500 European IT Managers commissioned by Websense, 60% said that their company does not have systems in place to guard against internal threats with 35% unable to deal with spyware (and 62% unable to block phishing attacks).<\/p>\n<p><a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/securing-network-using-microsoft-isa.htm\">Protecting the network edge<\/a> is all very well, but the guiding security principle of defence in depth needs to be applied. Networks need to be segregated, with firewalls (or at the very least separate VLANs) restricting traffic between segments but the real answer to the mobile user issue is remediation.<\/p>\n<p>The principle behind remediation is that on returning to the corporate network, users will not be granted full access until their device has been scanned for operating system patches, anti-virus and anti-spyware signatures and any application patches required. Only once all of these have been installed, will the user be granted full access to the network. Of course, as Dave Bailey recently commented in his article <a href=\"http:\/\/www.itweek.co.uk\/comment\/1161507\">will you pass the access test?<\/a> which appeared in IT Week recently, there will be occasions when patches fail to apply, or when returning users simply have too many updates to be applied and it impacts on their legitimate business operations (but not half as much as a full-blown network attack could impact on their business).<\/p>\n<p>Both Microsoft and Cisco are preparing their remediation technology offerings. Cisco has it&#8217;s <a href=\"http:\/\/www.cisco.com\/en\/US\/netsol\/ns466\/networking_solutions_sub_solution_home.html\">network admission control<\/a> (NAC) technology, whilst Microsoft&#8217;s approach is <a href=\"http:\/\/www.microsoft.com\/windowsserver2003\/technologies\/networking\/nap\/default.mspx\">network access protection<\/a> (NAP) (when will they learn to read their acronyms phonetically &#8211; first WUS and now NAP). Unfortunately, NAP has been dropped from forthcoming ISA Server 2004 service\/feature packs and instead will be held over for Longhorn (although Windows Server 2003 does offer <a href=\"http:\/\/www.microsoft.com\/windowsserver2003\/techinfo\/overview\/quarantine.mspx\">network access quarantine control<\/a> for users connecting via a VPN).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law enforcement agencies in Israel and &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Spyware re-enforces the need for network segmentation and remediation<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[62,22],"class_list":["post-81","post","type-post","status-publish","format-standard","hentry","tag-malware","tag-networks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spyware re-enforces the need for network segmentation and remediation - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spyware re-enforces the need for network segmentation and remediation - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law enforcement agencies in Israel and &hellip; Continue reading Spyware re-enforces the need for network segmentation and remediation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-03-31T08:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-07-24T16:57:35+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Spyware re-enforces the need for network segmentation and remediation\",\"datePublished\":\"2005-03-31T08:27:00+00:00\",\"dateModified\":\"2007-07-24T16:57:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm\"},\"wordCount\":645,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Malware\",\"Networks\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm\",\"name\":\"Spyware re-enforces the need for network segmentation and remediation - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-03-31T08:27:00+00:00\",\"dateModified\":\"2007-07-24T16:57:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/spyware-re-enforces-need-for-network.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spyware re-enforces the need for network segmentation and remediation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spyware re-enforces the need for network segmentation and remediation - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","og_locale":"en_GB","og_type":"article","og_title":"Spyware re-enforces the need for network segmentation and remediation - markwilson.it","og_description":"There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law enforcement agencies in Israel and &hellip; Continue reading Spyware re-enforces the need for network segmentation and remediation","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","og_site_name":"markwilson.it","article_published_time":"2005-03-31T08:27:00+00:00","article_modified_time":"2007-07-24T16:57:35+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Spyware re-enforces the need for network segmentation and remediation","datePublished":"2005-03-31T08:27:00+00:00","dateModified":"2007-07-24T16:57:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm"},"wordCount":645,"commentCount":1,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Malware","Networks"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","name":"Spyware re-enforces the need for network segmentation and remediation - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-03-31T08:27:00+00:00","dateModified":"2007-07-24T16:57:35+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Spyware re-enforces the need for network segmentation and remediation"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":49,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/01\/microsofts-new-malware-removal-and.htm","url_meta":{"origin":81,"position":0},"title":"Microsoft&#8217;s new malware removal and anti-spyware products","author":"Mark Wilson","date":"Friday 14 January 2005","format":false,"excerpt":"This week, alongside the January security updates, Microsoft released the first version of its malware removal tool, called the Microsoft Windows Malicious Software Removal Tool (MSRT). New versions will be released on the second Tuesday of each month (with the monthly security updates) and each version will be cumulative. Note\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":77,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm","url_meta":{"origin":81,"position":1},"title":"Looking at where spyware hides and why we should be bothered about it","author":"Mark Wilson","date":"Wednesday 23 March 2005","format":false,"excerpt":"I just came across a useful page on the HP website providing details of some of the locations where spyware hides and the different forms it takes. Another page looks at the business cost of spyware. Interesting reading.","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":550,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/what-you-should-know-about-spyware.htm","url_meta":{"origin":81,"position":2},"title":"What you should know about spyware","author":"Mark Wilson","date":"Monday 2 August 2004","format":false,"excerpt":"Microsoft have published an interesting article to give a heads up on spyware. Simple it may be, but practical advice nonetheless. Even experienced administrators need to beware - whilst researching some security issues this week, out of necessity I hit on some of the more unsavoury sites on the 'net\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":492,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/microsoft-buys-into-anti-virus-market.htm","url_meta":{"origin":81,"position":3},"title":"Microsoft buys into the anti-virus market","author":"Mark Wilson","date":"Tuesday 8 February 2005","format":false,"excerpt":"Following Microsoft's recent foray into the anti-spyware market and ending months of speculation, Microsoft announced today that it is to attack another form of malware through its purchase of Sybari Software. Whether anti-virus technologies will be included within Windows (alongside the Windows Firewall), or made available as a separate download\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":873,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/08\/forefront-client-security.htm","url_meta":{"origin":81,"position":4},"title":"Forefront Client Security","author":"Mark Wilson","date":"Tuesday 7 August 2007","format":false,"excerpt":"A couple of years back, Microsoft bought a load of security companies and since then we've seen them continue to offer FrontBridge services as Microsoft Exchange Hosted Services; Windows Defender was born out of the previous Giant Company anti-spyware product, and a couple of months back they released Forefront Client\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":46,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/microsoft-buys-giant-company.htm","url_meta":{"origin":81,"position":5},"title":"Microsoft buys Giant Company","author":"Mark Wilson","date":"Tuesday 21 December 2004","format":false,"excerpt":"Back in August I posted a blog entry about the what you should know about spyware article on the Microsoft website. The article has since been replaced but I was interested to read about Microsoft's purchase of Giant Company - a leading provider of anti-spyware and anti-spam software. Paul Thurrott's\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}