Microsoft Bringing EMET Back As a Built-In Part of Windows 10 (arstechnica.com) 49
An anonymous reader quotes a report from Ars Technica: The Windows 10 Fall Creators Update will include EMET-like capabilities managed through a new feature called Windows Defender Exploit Guard. Microsoft's EMET, the Enhanced Mitigation Experience Toolkit, was a useful tool for hardening Windows systems. It used a range of techniques -- some built in to Windows, some part of EMET itself -- to make exploitable security flaws harder to reliably exploit. The idea being that, even if coding bugs should occur, turning those bugs into actual security issues should be made as difficult as possible. With Windows 10, however, EMET's development was essentially cancelled. But as more mitigation capabilities have been put into Windows, the need for a system for managing and controlling them has not gone away. Some of the mitigations introduce application compatibility issues -- a few even require applications to be deliberately written with the mitigation in mind -- which means that Windows does not simply turn on every mitigation for every application. It's here that Exploit Guard comes in.
Java Killer! (Score:5, Informative)
At my employer...a VERY large Defense company, they had pushed out EMET.
It promptly broke almost all of our Java application (Kills the virtual machine). The third party desktop support people are authorized to disable or remove it.
Re: (Score:2)
[EMET] promptly broke almost all of our Java application (Kills the virtual machine).
Sounds like it knows just what to do. If it gets rid of Flash as well, we're golden. ;)
Re: (Score:2)
You fucking tell that to the people trying to get quarterly financials out.
Fuck you.
Re: (Score:1)
At my company (some large science lab) it screws up Chrome badly.
Re: (Score:2)
You have to disable EAF+ for chrome.exe within the "Apps" section of EMET.
'Hardening' (Score:1)
Re: (Score:1)
EMETic indeed (Score:2)
Re: (Score:2)
I can't think of a single Microsoft product with a good name. Not one.
The problem is that what constitutes a "good name" to most users is completely different than what constitutes a "good name" to tech-savvy users like the /. crowd. Normal users are much more willing to put up with crapware than tech-savvy users are.
IMO, the best M$ product is the combination of Excel and VBA. Although both are buggy and can be a PITA to work with, nothing else can replace them (yet). Sure, LibreOffice and WPS try, but anything that can only replace Office functionality 80% of the time is
Last Remote Root hole in OpenSSH ? Oh yeah, NEVER. (Score:2)
Are there hacks, exploits, and malware for other operating systems? Sure! However, consider that these full-p3wnd remote exploits seem to get released as zero day at least once a year for Windows OS's and often
Re: (Score:2)
Re: (Score:2)
"it's where the money is"
Given this statement, why haven't we seen widespread ransomware deployed to what the Internet is essentially made of (Linux servers)? I mean, that's where the *real* money is. Why go after petty consumers for $300 a pop when you could go after a ton of wealthy corporations that have real money at stake by losing millions of ecommerce dollars an hour, running their businesses on Linux server farms?
Re: (Score:2)
So I guess Linux users are simply smarter than Windows users...??
Re: Last Remote Root hole in OpenSSH ? Oh yeah, NE (Score:1)
Re: (Score:2)
Re: (Score:2)
Because the companies that make millions per hour in e-commerce spend money on security. Those that don't, don't
Re: (Score:1)
Re: (Score:2)
All the worms, ransomware, and malware that gets widespread exposure and ends up loaded on millons of vectors is ALWAYS WINDOWS.
Except for little things, like heartbleed [wikipedia.org]?
When was the last time you saw a remote root exploit for SSH?
2001 [itworld.com]
2013 [sophos.com]
Re: (Score:2)
Neither of the OpenSSH exploits you link to is a remote root exploit. When exploited, both only give the attacker the privileges of the authenticated user.
The 2001 exploit only works against accounts with passwords of 2 characters or less, which are trivially brute-forceable anyway. Calling this an "exploit" is like pointing out that a tissue paper door is even weaker if you have a spray bottle with you.
The 2013 exploit is very difficult to take advantage of, and isn't very worrying even so. First, an attac
Re: (Score:2)
Are the EMET service providers called EMETICS?
Pressing question (Score:3)
So the question is, since it's called "Defender," do you need to run their lukewarm, signature-based Defender antivirus to use the EMET features? Because that would be a deal-breaker for me.
Re: (Score:3)
I'm sure you can install burning hot Mcafee too if you wish. Burning hot being what your CPU will be wherever you install it.
Re: (Score:1)
It would be a better solution technically, but Windows exists largely on support for legacy software. Microsoft would lose a lot of their lock-in. If I have to buy or write new software anyway, why wouldn't I run it on Linux instead?
Re: (Score:1)
That name... (Score:2)
Mitigation experience? Seriously?
Isn't an "experience" just something that happens to you and isn't really under your control?