Prevx Retracts BSoD Claim, Apologizes to Microsoft

Oh Prevx what a mess you've made. Then again, maybe it was a misinterpretation by journalists across the industry after the UK security firm pointed to recent Windows updates as a possible cause for a wash of Black Screen of Death errors. Prevx said that its original blog was taken out of context and "may have caused an inconvenience for Microsoft."

With that said, the company reports that it has formally apologized to Microsoft for the firestorm. "Microsoft is a valued partner and our fix was developed to ensure its customers were able to quickly resolve the Black Screen issue without having to reinstall Windows as some users indicated," said Mel Morris of Prevx in this blog.

Morris' blog follows the official apology released yesterday by Prevx's director of research Jacques Erasmus, found in his blog here. Erasmus said that the widespread BSoD had nothing to do with Microsoft's recent updates. In fact, the errors stem from possible malware infections.

"Having narrowed down a specific trigger for this condition we've done quite a bit of testing and re-testing on the recent Windows patches including KB976098 and KB915597 as referred to in our previous blog," he said. "Since more specifically narrowing down the cause we have been able to exonerate these patches from being a contributory factor."

So does that mean it's safe to download the latest Windows updates?

Create a new thread in the UK News comments forum about this subject
This thread is closed for comments
Comment from the forums
    Your comment
  • wifiwolf
    i've been updating each time their available and no prob
  • Scott2009 - If you're software runs under Microsoft Windows it's a good idea to know and test the patches 'side effects', if any, on your own 3rd party software (from a consumer perspective).

    It'd also help if they had advanced access to certain security updates.

    Malware authors target the 3rd party applications more than Windows, as they often increase the surface area they can leverage. Often these tools cause more problems than they solve. Especially if they require kernel mode weirdness and undocumented changes.

    Bigger target = Easier to hit = Two parties 'managing' the code, or at least it's implementation & integration.

    Honestly, SpyBot S&D + donations, and MS Security Essentials (or similar) are all people need.

    Does anyone even remember when Norton / Symantec was a 'good' company ?, with 'good' software ?

    If they only 'protect' Windows, then claiming (or implying) that Microsoft broke something is really bad form for their business.

    I reckon the whole thing was just to gain some 'free' advertising. Even if more people will just avoid their software now.