Stephen Toulouse
Stephen Toulouse
Stephen Toulouse, also known as Stepto, former Director of Xbox LIVE Policy and Enforcement at Microsoft. He frequently represented Microsoft and Xbox Live in various media, including on Larry Hryb's "Major Nelson Radio" Xbox-related podcast, to discuss security and policy issues...
activities against close constantly customers environment exploits eye help keeping lists malicious protect related threat threats
The MSRC is constantly monitoring the threat environment for any malicious activity. We are keeping an especially close eye on the newsgroups and vulnerability lists for exploits related to this month's activities and will mobilize immediately to help protect customers against threats as necessary.
benefit huge
It had a huge benefit to our developers.
currently early explorer firm however internet process testing update
We're working on an update to Internet Explorer and that update is currently in our testing process and could come out as early as April. However there's no firm date.
cumulative explorer internet night security update
We're working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability.
anybody customers hack leave might problems quick time whenever
We can't leave anybody behind. And unfortunately you might be introducing new problems. So whenever we look at even a quick hack ... it's got to be of quality. That's what customers have told us time and again.
cnn computers hit keeping knew literally meeting reporting shutting target track tuesday word
We're literally in a meeting going over our plans, keeping track of things, when we got word on Tuesday that CNN was reporting they had been hit. At the time, we knew a high-profile target was reporting they had been hit and they didn't know what it was. Their computers were shutting down and restarting,
impact partners seeing widespread
Certainly, right now, we and our anti-virus partners are not seeing a widespread impact of this attack.
address against brought complete issue protect underlying update vulnerable
Should MS05-018 have been a more complete update to address the underlying vulnerable function? Yes, Cesar is right. But I want to reiterate that MS05-018 did protect against the issue that was brought to us,
anyway customer drove history looking people questions sure
We had been looking into detailing the history anyway and some customer questions drove the idea to write it up. We just wanted to make sure people had the history.
began plan ready test track update weeks
Our test and engineering plan for that update that we began two weeks ago is on track to have that update ready for Tuesday.
attempted continue currently customers exploit help older operating protect publicly systems urge versions
Currently this exploit is not publicly available, but we continue to urge customers on older versions of our operating systems to deploy MS05-051 to help protect from attempted exploitation,
currently early phase released testing update
Currently that update is in the testing phase and could be released as early as April. But of course, that isn't final.
although bad customers infection information mean providing rates sure
Although infection rates are low, it doesn't mean it's not a bad situation, ... We want to make sure, not only are we providing information to make sure customers aren't impacted, but to make sure they know how to get back to an operational state.
accelerate cause fast problems takes testing trigger
This is why it takes so long, but that's not to say that if there's an exploit, we won't accelerate testing and get it out there as fast as we can. But if we find problems in the testing phase, it could trigger a restart and cause even more delays.