Vulnerabilities in Windows
All Windows Versions are Vulnerable
Designed for ease-of-use rather than security, all versions of Microsoft Windows are vulnerable. Older, especially obsolete, versions have weaknesses including zero-day exploits that have been patched in newer versions.
You ignore Windows security at your own peril.
Beware of the Human Factor
People are too trusting of any warning that appears on their computer, particularly when visiting websites with their browser.
Example: “I Love You” Virus
James Gleick illustrated this human factor in an article discussing some of the Windows vulnerabilities exploited by the “I Love You” virus. We are more likely to open an email (or click on a advertising link) that appeals to our need for approval or caters to our fears.
Facebook has used this fear of missing something and inate human curiosity to exploit users with obfuscated links to ads that promote fake news while totally ignoring their own responsibility in the matter.
Fake Virus Warnings
Virtually all notices that suddenly appear on your screen warning about dozens or hundreds of infections on your computer are probably scamming you into downloading a genuine infection or selling you a bogus service.
Virtually all popup warnings that won't go away or warnings about dozens or hundreds of vulnerabilities on your computer are scams. It is difficult for many users to determine what a “legitimate” site looks like.
What folks need to do is to learn how their installed security software reacts to a genuine threat. Anything else is then a threat in itself rather than a warning about any real danger.
No, It's Not Microsoft Phoning You
If you receive a phone call telling you that your computer is at risk, hang up.
They are NOT Microsoft (or anyone legitimate) NOR are they trying to help you. Their goal? To scam you into:
- divulging information about your computer;
- open an exploitive website using your browser; or
- providing your credit card information for the "help" you're given.
Your best solution is to simply hang up.
Educate Yourself About the Risks
Guard Physical Access to Your Computer
Anyone with physical access to your computer can make changes to Windows or visit areas on the Web that pose a risk to your computer. That physical access can be through malicious software on a removable storage device or by giving access to your computer.
Computer systems have been exploited by mailing CDs or leaving USB thumb drives in a company parking lot. Someone is going to plug them into their computer and release whatever troublesome gremlins are installed!
Be sure to take care when choosing someone to work on your computer and do not allow your children (or their friends) unsupervised access to your computer.
Windows "Ease-of-Use" is a Trade-off
Windows was built to be easy to use, with security apparently a casual afterthought — at least in versions earlier than Vista. The trade-off is between security and ease of use.
Consider the following analogies when deciding that "easier is better" in your computing experience:
Using Internet Explorer in Windows is like leaving your car parked downtown overnight with the doors unlocked, the windows rolled down and the keys in the ignition, then wondering why your car is gone in the morning.
Installing updates and alternatives to programs built into Windows is inconvenient, but consider why your car has those inconvenient locks and seat belts. Cars once had neither, yet they are now installed — for a very good reason.
The front door key to an apartment building is the same for everyone. What if the building supervisor provided the same key for every apartment and allowed you to think that your apartment key was unique? Access for maintenance would be easier, but your unit's physical security would be severely compromised.
Similarly, various Windows components and Microsoft Office products are highly integrated, making everything function smoothly. Because of that interoperability, weaknesses in one program (or component) can quickly spread to others.
For example, vulnerabilities in Internet Explorer spread to Outlook because components of IE were used to display the HTML (or “enhanced”) email content. Microsoft “fixed” this by making MS Word responsible for the HTML content.
The Dangers of Administrator Privileges
Most Windows computers only have one account that runs with full administrator privileges. Lesser accounts are available, but are difficult for most users to manage.
Most Linux users are much more aware of these dangers and tend to create a separate user account from the administrator account. Changes to the system require the administrator's password, even in the basic Linux install.
At the very least, you should provide only limited access accounts for your children and ensure that the Administrator accounts are protected by decent passwords.
User Account Control
Windows Vista's User Account Control (UAC) became known for its intrusive nature. Windows 7 is somewhat less intrusive and allows the user to choose a lesser level of security. This leaves you more vulnerable because degrading the security level is like deciding to buckle up your seat belt after you are in a serious car collision.
While Windows is less secure than Linux this allows for easier installs, upgrades and exchange of information although recent versions of Linux provide a much easier interface even for beginners.
Vulnerabilities Are Relative
Beware of comparisons of how many vulnerabilities rather than the severity of the security breach. One serious system-wide vulnerability can be much more dangerous than dozens of small potential weaknesses.
Always Install Windows Critical Updates
Windows Update improves the security of your Windows system. To protect yourself from many of these vulnerabilities make sure you have the latest security patches for Windows and Office products you have installed. Uninstall unused or obsolete (unsupported) software.
- Windows 7 and the now-unsupported Vista users will find Windows Update in the Control Panel (open the Control Panel then select Windows Update).
Unfortunately, Microsoft used the Windows Update as a means to move unsuspecting Windows 7 and 8 users into Windows 10. As a result, many turned off Windows Update completely, leaving themselves vulnerable to many zero-day vulnerabilities (known but unpublished vulnerabilities) that have been patched.
This automated update threat is no longer present and you can generally turn on “Install updates automatically (recommended)” in Windows Update, but you might want to avoid most optional updates.
Microsoft has no one but themselves to blame for folks that abandon Windows completely and use only mobile devices or move to Linux or Apple.
Is Your System Mission Critical?
Microsoft tends to run all their updates once a month on “patch Tuesday.” The downside to this is that some updates in large batches can create problems (thankfully, relatively rare).
For this reason, some administrators of “mission critical” systems wait to find out if there are problems with patches before updating. This is not recommended for home users because downtime due to such problems are an inconvenience, not something that will put lives or critical systems in jeopardy.
Weekly Maintenance Routine
Updates should be part of your weekly maintenance routine. You should maintain the updates to Internet Explorer (IE) even if you use another browser since IE is so tightly integrated into the Windows operating system.
As well as updates to Windows, you should be checking your other security software (firewalls, antivirus and anti-spyware software) as well as updates for all the programs on your computer.
Daily Security Software Updates a Bare Minimum
You should be updating your security software at least daily — I recommend that you update several times a day. In the case of a serious attack, hourly updates may save your programs and data from ruin.
A 2004 study conducted by Symantec, best know for Norton Antivirus, determined that the time from release of a patch and the release of malicious code to exploit it is was only 5.8 days. At that time, weekly updates were a bare minimum. I assure you that the Internet has only become less friendly since then.
Windows Critical Updates
Windows has a Windows Critical Updates notification/installation utility. Most users should use Automatic Windows Updates.
I'd suggest at least being notified and install them as soon as you are able. Delays can be costly.
Windows Updates Options
Windows Updates are classified as Important updates and Recommended updates.
Always install the Critical Updates and Service Packs when available. These are considered vital to the safety of your Windows system.
Recommended Windows Updates may deal with specific issues some users are having. If you have no need for optional updates, don't install them.
Windows Update can also check for updates to Microsoft Office (more current versions only). Currently supported versions of Windows automatically downloads and installs updates (Internet Explorer is not directly used any more).
Driver Updates Alternatives
Driver Updates may fix a problem with hardware, but I have experienced some Microsoft driver updates corrupting my Windows installations. You might wish to go to the component manufacturer's site to check for an update, particularly for video driver updates. System Restore provides a recovery solution if such a problem arises.
There are Windows Alternatives
This is partly due to their relative smaller footprint in the computer world and partly due to better design. Apple computers have received more attention from hackers and malicious software since macOS and iOS have increased popularity, so you should check for security solutions specific to your operating system to be safe.
There are also lesser-known operating systems that may prove suitable to your needs.
Vulnerabilities Still Exist
All software (including operating systems) have vulnerabilities. Even if you move to an alternate to Windows you'll have to update and monitor vulnerabilities.
Moving from Windows also means you'll experience a learning curve, but perhaps that is an acceptable cost. The main deferent for most folks is either gaming software or expensive software licensed only for Windows.
ActiveX: A Potential Security Risk
There's nothing wrong with ActiveX as long as you trust completely the guy who wrote it, says research scientist Gary McGraw of Reliable Software Technologies.
But it's like leaving your office to go to lunch and running into some guy who says he'd really like to use your computer for the next hour, and letting him sit and do whatever he likes while you're away. But as far as running trusted code, it's a very powerful and useful technology. — quoted on CNET News
Fortunately, the future of ActiveX is relatively short as HTML-5 and Windows 10's Microsoft Edge don't use it.
Should I Install ActiveX Controls?
Maybe. You should be cautious about installing ActiveX controls, sometimes called addons, on your computer, even if they have a valid digital signature. While ActiveX controls can enhance web browsing, they might also pose a security risk, and it's best to avoid using them if the webpage will work without them. However, some websites or tasks might require them, and if the content or task is important to you, you will have to decide whether to install the ActiveX control. — Microsoft
Microsoft suggests that before installing an ActiveX control, you should consider the following:
If you do not understand the dangers of installing Active X controls or files, they can cause the destruction of your data, and can unleash unimaginable and horrific viruses and malware, so please, please, please, be aware of the dangers of the installation of these files before proceeding any further. — Microsoft
It is very difficult to know what an Active X control from an unknown source will do. I strongly recommend that you do not install this dangerous and basically unsupported legacy of Internet Explorer.
Java is Safer
Java is a safer alternative to Active-X but has its own security issues.
Underlying the Java SE Platform is a dynamic, extensible security architecture, standards-based and interoperable. Security features — cryptography, authentication and authorization, public key infrastructure, and more — are built in. The Java security model is based on a customizable 'sandbox' in which Java software programs can run safely, without potential risk to systems or users. — Java SE Security
Java is one of the three most common vulnerabilities (the other two being Adobe Flash and Adobe Reader) which is why Firefox disables Java by default (recommended).
Browser Support for Java Ending
In fact, most browsers now disable Java and newer versions of Java no longer support browser integration (why we're running version 8 even though versions 9 and later have been released). 2019 is likely going to see the end of any support for Java within browsers.
Removed Older Java Versions
Always remove older versions of Java so that you're not exposing your computer to vulnerabilities that have been patched with more recent updates.>
Restrict the Use of Internet Explorer
I strongly recommend that you DON'T use Internet Explorer to surf the Web or to configure devices. It is rarely required elsewhere (a couple of exceptions are the now-retired Microsoft FixIt solutions and some Symantec utilities).
Instead, I recommend Firefox as your primary browser.
Remember, if you employ addon functionality in Firefox, they can add their own vulnerabilities. Firefox has changed the way extensions (addons) and plugins work in Firefox, ending support for many of them. HTML 5 and built-in support for viewing PDFs and similar technologies has made them obsolete.