Saturday , May 28 2016
Breaking News
Home / Tech Updates / General news / Microsoft battles pirated software as a security risk

Microsoft battles pirated software as a security risk

Company has long battled China’s software piracy, which is among the highest in the world. Last yearChina’s illegal software market was valued at close to US$9 billion, while the legal market was valued at $2.7 billion, according to a study by the Business Software Alliance.

Microsoft last week said users of the counterfeit Windows software are often saddled with unreliable PCs running malware that can steal users’ credit card and bank account information. The anti-piracy campaign was launched during a busy holiday season in the country.

Infected PCs found

Over an 18-month period, Microsoft said it conducted its “most extensive forensic survey” of PCs bought in China, by purchasing computers from Chinese shops and “IT malls,” which can feature dozens of different small vendors in one building. Of the 169 PCs running pirated versions of Windows, 59 percent were already infected with malware, and 72 percent featured altered Internet browsing settings that intentionally sent users to scam and phishing websites.


Some of these PCs contained a malware known as “Nitol,” which when activated through a preinstalled music player can remotely log user keystrokes and spy on users through the computer’s webcam. More than 70 percent of the systems also had their Windows update, Windows firewall, and user account control warning functions disabled, making them vulnerable to cyber attack.

“Counterfeiters have pitched this story to consumers that software piracy or pirated products themselves don’t cost anything, they’re free. They’ve also pitched the story that it works just fine, it’s good enough,” said Psyhogeos in a media briefing. “Neither of those statements are accurate.”

The PC brands that were found preinstalled with counterfeit Windows software include big names such as Acer, Asus, Dell, HP, Lenovo, along with smaller Chinese vendors. But Microsoft said the piracy is believed to come from further downstream in the supply chain, through resellers who are loading the counterfeit software and malware into the products in order to lower the cost of PCs sold.

OEMs that make the PCs will often install a non-Windows operating system such as FreeDOS on the product, Psyhogeos said. This makes it highly likely that a third-party will later install a pirated version of Windows on the PC during its distribution.

As part of Microsoft’s new “Keep it Real” campaign, the company has notified 16 Beijing-based resellers, who were found repeatedly selling PCs pre-installed with counterfeit Windows versions, to stop the piracy. Microsoft will consider legal action as a last resort.

[source : PCworld]



  1. I want what they are called from the 3 major battles!! All assistance will be appreciated!! =]

  2. What battles did the U.S. and Germany fight one another in?

  3. I’m wondering if anybody understood of the website on most the battles of World war 2, not always these but a big part. All of the websites I’ve found have only the main battles, those most abundant in casualties.

  4. fc- 4726- 0192- 4709

    title- north

    double fight


    your prize is definitely an eevee.

  5. The main battles from the Civil War were The Very First Fight of Bull Run, The 2nd Fight of Bull Run, The fight of Gettysburg, The Fight of Antietam, The fight of Shiloh, Fort Donelson/Fort Henry, the fight of Fort Sumter, Appomattox, the fight of Chancellorsville, the fight of Fredericksburg, the fight of Knoxville, the fight of Vicksburg, Sherman’s March towards the Ocean, Monitor versus. Merrimack, The fight of Backwoods(?), and Cold Harbor.

    I have to be aware of dates from the battles, the place, the significance of the battles, the end result of every fight, and also the leaders of every fight confederate and union.

    Sorry to request for thus much.. Appreciate responding to! (:

Leave a Reply

Your email address will not be published. Required fields are marked *