Linked by Thom Holwerda on Wed 10th Aug 2005 18:51 UTC, submitted by Not_Today
Privacy, Security, Encryption Microsoft unveiled details of its Strider HoneyMonkey research, a project that sniffs out sites hosting malicious code, and hands the information to other parts of the company for patching or legal action. The technical report (pdf) outlines the concept of cruising the Web with multiple automated Windows XP clients - some unpatched, some partially patched, some patched completely - to hunt for Web sites that exploit browser vulnerabilities.
Thread beginning with comment 16661
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE: Bass Ackwards Security Approach
by BrianH on Wed 10th Aug 2005 21:13 UTC in reply to "Bass Ackwards Security Approach"
Member since:

And how do you expect them to find out what the browser vulnerabilities that they should be fixing are? They do it by determining what the malicious sites are doing.

If MS knew ahead of time what the problems were, they would have fixed them already.

Reply Parent Score: 1