Microsoft-Sponsored Study Says Problems Caused By Using Windows Software Will Cost Businesses $500 Billion In 2014

from the awkward dept

The copyright industries' obsession with trying to shoot down piracy at all costs can sometimes cause them to end up shooting themselves in the foot. Here, for example, is a great example from Microsoft, which has recently been fulminating against the dangers of software piracy:

A new study released Tuesday reaffirms what we in Microsoft’s Digital Crimes Unit have seen for some time now -- cybercrime is a booming business for organized crime groups all over the world. The study, conducted by IDC and the National University of Singapore (NUS), reveals that businesses worldwide will spend nearly $500 billion in 2014 to deal with the problems caused by malware on pirated software. Individual consumers, meanwhile, are expected to spend $25 billion and waste 1.2 billion hours this year because of security threats and costly computer fixes.
The study fills out the picture with some details of the methodology (pdf):
In 2013 IDC tested pirated software from more than 550 Web and P2P sites or CDs bought in street markets to determine the prevalence of malware in pirated software. In January and February of 2014, the Department of Electrical and Computer Engineering at National University of Singapore conducted a forensic analysis of 203 PCs that were purchased from PC resellers, specialty shops, and PC markets in typical buying situations in 11 countries. Together, this research found the chances of encountering malware in a pirated copy of software is one in three. The chance of encountering malware in a PC purchased with pirated software is more than 60%.
Although the report doesn't say so explicitly, we are clearly dealing with Windows systems here -- computers are referred to throughout as "PCs," never as Macs, and some of the malware is named as "Win32/Enosch.A, Win32/Sality.AT, Win32/Pramro.F," which attack Windows systems exclusively. We can also be pretty sure that none of the infected programs was open source. Why? Because pirating software that is already freely available makes no sense -- and is certainly unlikely to be as profitable as offering black market versions of costly closed-source programs.

Putting this information together -- in order to "Get The Facts" as Microsoft always liked to say -- we arrive at the interesting conclusion that the use of commercial closed-source programs running on Microsoft Windows will cost businesses around $500 billion in 2014 alone because of the wasted time, lost data and reputational damage that will result from associated malware infections.

Assuming the research results are representative of what's happening -- and there's no reason to suppose they aren't -- the obvious conclusion to draw from them for PC users is not just to stop using pirated software (a good idea), but to stop using Windows-based programs too, and to switch to open source applications running on an open source operating system like GNU/Linux. After all, free software is even cheaper than pirated software, and yet rarely has any of the problems identified in the new report.

That's a really useful message for those facing the unwelcome prospect of paying their share of $500 billion to deal with the multiple problems associated with the Windows platform, but probably not the one Microsoft had in mind when it sponsored the research.

Follow me @glynmoody on Twitter or, and +glynmoody on Google+

Filed Under: copyright, infringement, malware, open source, piracy, software
Companies: microsoft

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. identicon
    Rich Kulawiec, 4 Apr 2014 @ 3:54am

    Re: Re: Re: When We All Go to Linux Heaven...Pie in the Sky

    I'm sorry that you failed to articulate your point clearly; however, you're completely wrong about this as well.

    First, not everyone is motivated by the prospect of financial reward. In fact, quite a bit of activity stems from other motivations: politics, ideology, curiosity, religion, nationalism, espionage (state or corporate), stalking, etc. It's often blithely (and incorrectly) presumed that one can ascertain the motives of attackers based on target selection; but that's proven to be dubious guesswork.

    Second, if we confine our discussion solely to those who are seeking to profit, it is of course obvious that they will largely target Unix and Linux systems, because "that's where the money is" (h/t John Dillinger). Oh, they may attack Windows or MacOS systems en route to that goal, because of course getting into those might make it easier; but they're just stepping stones on the way to the final objective. The real prize, at almost every enterprise, university, ISP, or government is running Solaris or AIX or FreeBSD or Red Hat -- and getting into one of those systems is easily far more profitable than getting into 100K Windows desktops. (Which has by the way now become so easy and routine that it's no longer a challenge, merely another yawn-worthy daily occurrence.)

    This situation is unlikely to change: the vastly superior architecture of Unix (and Linux) tends to mitigate the scope and severity of security holes, while the laughably inferior architecture of Windows exacerbates them. Microsoft could fix this, but of course that would require admitting their colossal mistakes -- so it won't happen. They would rather continue to pretend that it's actually possible to wallpaper over their mistakes. (Hint: it's not. As we've seen. For twenty years.)

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Techdirt Gear
Shop Now: Techdirt Logo Gear
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Report this ad  |  Hide Techdirt ads
Recent Stories
Report this ad  |  Hide Techdirt ads


Email This

This feature is only available to registered users. Register or sign in to use it.