{"id":801,"date":"2006-10-02T00:00:00","date_gmt":"2006-10-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/02\/microsoft-taking-security-risks\/"},"modified":"2021-12-30T11:38:11","modified_gmt":"2021-12-30T11:38:11","slug":"microsoft-taking-security-risks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/02\/microsoft-taking-security-risks\/","title":{"rendered":"Microsoft &#8216;taking security risks&#8217;"},"content":{"rendered":"<p>Microsoft is taking security risks with its forthcoming Vista operating system, says software firm McAfee.    The security specialist has taken out a full-page advert in the Financial Times to alert readers to its concerns.  It feels the tech giant is increasing risks of hacks and viruses by locking out third-party software firms from its in-built security system for Vista.  The row also involves the European Union, which is watching Vista&#8217;s release for signs of monopoly abuse.   &#8220;With its upcoming Vista operating system, Microsoft is embracing the flawed logic that computers will be more secure if it stops co-operating with the independent security firms,&#8221; wrote George Samenuk, McAfee&#8217;s chairman and chief executive in the advert.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security firms such as McAfee and Symantec believe Microsoft&#8217;s actions around security for Vista amounts to a similar anti-competitive stance.<\/p>\n<p>Last month the European Union competition commissioner, Neelie Kroes, accused Microsoft of orchestrating a &#8220;co-ordinated campaign&#8221; to discredit her.  It added: &#8220;If Microsoft wants to make Vista more secure, it should provide equal access to the platform that its own developers have to ensure that security vendors can continue to innovate on the platform, and to ensure that consumers and manufacturers can continue to choose the best security solutions for the platform.&#8221;<\/p>\n<p>http:\/\/news.bbc.co.uk\/1\/hi\/technology\/5399534.stm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-801","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=801"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/801\/revisions"}],"predecessor-version":[{"id":3288,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/801\/revisions\/3288"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}