Stephen Toulouse
Stephen Toulouse
Stephen Toulouse, also known as Stepto, former Director of Xbox LIVE Policy and Enforcement at Microsoft. He frequently represented Microsoft and Xbox Live in various media, including on Larry Hryb's "Major Nelson Radio" Xbox-related podcast, to discuss security and policy issues...
anyway customer drove history looking people questions sure
We had been looking into detailing the history anyway and some customer questions drove the idea to write it up. We just wanted to make sure people had the history.
time
It is on the table. Every time any kind of exploitation is going on, it is on the table.
currently early explorer firm however internet process testing update
We're working on an update to Internet Explorer and that update is currently in our testing process and could come out as early as April. However there's no firm date.
cumulative explorer internet night security update
We're working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability.
cnn computers hit keeping knew literally meeting reporting shutting target track tuesday word
We're literally in a meeting going over our plans, keeping track of things, when we got word on Tuesday that CNN was reporting they had been hit. At the time, we knew a high-profile target was reporting they had been hit and they didn't know what it was. Their computers were shutting down and restarting,
anybody customers hack leave might problems quick time whenever
We can't leave anybody behind. And unfortunately you might be introducing new problems. So whenever we look at even a quick hack ... it's got to be of quality. That's what customers have told us time and again.
applying customers recommend risk tested weigh
We have not tested this mitigation tool. We can't recommend it because we have not tested it...Customers should weigh the risk of applying something like this to their systems.
benefit huge
It had a huge benefit to our developers.
automatic enable flaws key people risk understand
The key thing is really that we want to make people understand the risk with these flaws and that they enable automatic updates.
attempted continue currently customers exploit help older operating protect publicly systems urge versions
Currently this exploit is not publicly available, but we continue to urge customers on older versions of our operating systems to deploy MS05-051 to help protect from attempted exploitation,
currently early phase released testing update
Currently that update is in the testing phase and could be released as early as April. But of course, that isn't final.
against applied available center correctly customers download install problem protect resolved situation update
This situation is now resolved and customers should be able to get the update. I want to reiterate that the problem had nothing to do with the update itself, you applied it manually from the download center or got it through SUS 1.0 it should install correctly and protect against the vulnerability. But it's available now for everyone.
against code convinced exploit matter reaction saw security team tested windows
We saw the exploit code and our Security Windows Reaction Team tested it against the patch, and we were convinced we would see an attack. It was only a matter of time,
although bad customers infection information mean providing rates sure
Although infection rates are low, it doesn't mean it's not a bad situation, ... We want to make sure, not only are we providing information to make sure customers aren't impacted, but to make sure they know how to get back to an operational state.