Martin Cooper takes a step back from all the Windows 8 fanfare and examines whether the cyber criminals will love or loathe Microsoft's new OS.
Over last 12 to 18 months, security - of the lack thereof has cast a growing shadow over Windows and the antivirus firms we trust to keep us safe online. Indeed, some have suggested that the bad guys might be winning in the never-ending game of high stakes chess. So the question is, will Windows 8 let us sleep sounder in our beds?
Security as Standard
To help protect Windows machines Microsoft has for a long time offered its Security Essentials antivirus program as a free download. Despite this, it's reckoned that almost a quarter of all Windows 7 PCs have no anti-malware software installed.
To address this problem, Microsoft has opted to install Windows 8 Defender by default.
Windows 8 Defender is a combined system. it's comparable with Security Essentials, with basic protective features thrown into combat common threats.
We certainly applaud the move, as it makes the initial hurdle that much tougher for virus writers. However, when PC Format asked Collin Davis, senior director of engineering at Symantec, about Defender, his response was unequivocal. "It's not enough".
As Windows 7 and 8 have so much in common under the hood, Windows 8's default security isn't - in his view - likely to overly challenge malware writers.
Boot Level Protection
Dig a little deep into Windows 8 and the story doesn't seem so bleak. During the PC boot phase, Microsoft has made strides to see off future malware.
Booting through the BIOS has remained largely unchanged for nearly 30 years. At its heart is a chain of module that tare executed in order. The process begins with the BIOS waking up, taking in ROM-based operations and calling on the master boot record.
The chain culminates in the Windows kernal and drivers being loaded and run. If malware can penetrate this initial process, the next program to run can be corrupted. In short, no process after the point of exploitation can be trusted.
Malware such as Mebroot, TidServ and StuxNet insert themselves into this critical chain of events, compromising Windows at a very low and fundamental level. From such a privileged position it makes itself hard to detect and difficult to remove.
To combat this problem, Windows 8 includes a trio of technologies which are known collectively as Secure Boot Architecture. The first component is the Unified Extensible Firmware Interface, or UEFI. Assuming that your hardware is current and supports it, UEFI should make the lives of the virus writers' considerably harder.
Liek the BIOS, a UEFI system executes a sequence of baton-passing modules that lead to the OS . In a UEFI system, however, modules are security-signed and each module must check the subsequent operation's signature before it allows the next process to execute. The UEFI chain can be updated with a white list of trusted certificates.
Features and Flaws
The UEFI system isn't without a couple of flaws. Though all contemporary Windows systems will come with it as standard, older PCs still use the BIOS loading process and therefore remain vulnerable. The UEFI certification system has also enraged Linux users, as it makes it difficult to install the open source OS.
The next technology of note in Windows 8 is Early Load Anti-Malware. According to Microsoft, "|ELAM| starts before other boot-start drivers, enables the evaluation of those drivers and helps the Windows kernal decide whether they should be initialized." It is, in essence, a way of detecting malware during the boot process and blocking it.
Most Malware that Runs on Windows 7 will work on Windows 8
Windows 8 is designed to boot very quickly through, which places limits on what ELAM can achieve.
The Windows 8 specification also limits the amount of memory it can consume. Because it runs so early in the boot sequence and under such limitations, Symantec has already stated that "ELAM does little to improve security".
Remote Attestation is an optional feature. Implementing it inevitably slows down the boot process, which may not prove very popular with PC builders. If you upgrade or tinker with your PC, the timing check system will also need to be recalibrate. Remote Attestation, therefore, looks like a feature that we think will be best suited to corporate environments where systems remain unchanged by design.
The Metro Question
Windows 8 is all about the Metro interface - a collection of tiles linked to programs. Simply sweep though the wall of information and images, then tap the program you want to run. If you don't have a table or other touch enabled devices, you can use the interface with a mouse and keyboard instead.
There are two versions of Windows 8 - one designed to run on x86 chips and another complied for low-power ARM processors. The PC firms we spoke to had little to say about the latter version, and it's unlikely that malware authors have been able to research it much either. If Windows RT (as the ARM version is called) becomes a success, it will probably become the focus of malware writers, but at the moment it's impossible to say.
Looking at the x86 incarnation, Collin Davis explained that Windows 7 and Windows 8 classic are very close cousins. Therefore, most malware that runs on Windows 7 will work on Windows 8. Metro is however a different beast to a degree.
The Janus OS
From a security perspective it's easy to think of Windows 8 as two operating systems; Metro and Classic. Neither will run programs designed for the other. Metro is the more restrictive of the two, as you'll only be able to get programs from Microsoft's App Store, but the separation between Metro and classic Windows isn't clear cut.
Each Metro app works in a sealed environment or sandbox, which means it can't interact with other programs. In other words, Metro works in much the same way as Apple's sandboxed iOS - an OS that has so far avoided any major security silver bullet though. it is, in the words of Davis, "One of many tools that works well if it's done well."
Asked if Microsoft has implemented its sandboxing well, Davis replied, "It's too soon to tell."
There is one major chink in Metro's sandbox Armour. Metro is much like Windows Media Center-an environment that effectively sits on top of Windows Classic. Davis says this means that "a Metro app can't attack a Classic app, but a Classic app can attach a Metro one."
He adds that developing malware for Metro would be no harder or more expensive for virus writers.
It seems then Windows 8 makes the business of securing your PC subtly different, yet largely the same. The same rules, requirements and risks apply, so users should install a well-rated security suite and keep it updated.
Source: PC Magazine [UK]