Jeff Rivett has worked with and written about computers since the early 1980s. His first computer was an Apple II+, built by his father and heavily customized. Jeff's writing appeared in Computist Magazine in the 1980s, and he created and sold a game utility (Ultimaker 2, reviewed in the December 1983 Washington Apple Pi Journal) to international markets during the same period. Proceeds from writing, software sales, and contract programming gigs paid his way through university, earning him a Bachelor of Science (Computer Science) degree at UWO. Jeff went on to work as a programmer, sysadmin, and manager in various industries. There's more on the About page, and on the Jeff Rivett Consulting site.

All posts by jrivett


People are changing their passwords

It looks like the warnings about passwords are being heard by users everywhere. For years, industry experts have been telling people not to use simple passwords, and not to use the same passwords everywhere. Now, research shows that the previous most-used password, “password” is no longer #1.

Unfortunately, the new #1 password is “123456”. Which was previously #2. It’s difficult to categorize this as progress, since both of those passwords are equally terrible. Don’t use them. Please.

Cryptolocker malware is getting worse

A new variant of the nasty malware known as Cryptolocker is appearing on the Internet. Cryptolocker – once it infects your computer – encrypts all your files and then demands money to decrypt them. If you fail to pay within a specified time period, your files become permanently inaccessible.

The new version of Cryptolocker can apparently spread itself via portable media such as thumb drives. It is also often disguised as a software activation program for Photoshop and Microsoft Office on file sharing sites. The original Cryptolocker typically arrived in the form of a fake PDF file.

Disguising Cryptolocker as a software activation program is a particularly devious way to spread the malware. Every day, thousands of people who can’t afford the massively overpriced Office and Photoshop look for alternative ways to use that software, and now those people are going to be risking more than the ire of Microsoft and Adobe.

Google releases Chrome 32.0.1700.76

A new version of Chrome fixes eleven security issues and adds some enhancements, including indicators that tell you which tab is generating audio, better blocking of malware files, and stability and performance improvements. The version of Flash embedded in Chrome was updated to the latest version (12.0.0.41) as well.

The official announcement for version 32.0.1700.76 has additional details, and a post on the Chrome blog explains the new features.

Flash version 12 released

Yesterday, Adobe announced new 12-series versions of the Flash player for various environments and browsers:

  • Internet Explorer 10 on Windows 8 (via Windows Update): 12.0.0.38
  • Internet Explorer 11 on Windows 8.1: 12.0.0.38
  • Other versions of Internet Explorer: 12.0.0.38
  • Google Chrome (self-updating): 12.0.0.41
  • All other browsers on Windows: 12.0.0.43

You can get the new version from the main Flash download site.

Flash 12 includes some new features and enhancements, as well as fixes for several security vulnerabilities.

Patch Tuesday for January 2014

It’s a light month for Microsoft patches, with only four bulletins, none of which are flagged as Critical. The updates fix vulnerabilities in Office, Windows, and Server software.

Patches for the Windows XP NDProxy vulnerability and Office on Vista are among those made available today.

A post on the ISC Diary blog over at SANS has a useful overview of the vulnerabilities associated with this month’s patches.

As usual, the MSRC blog has its own spin on this month’s patches.

Oracle announces upcoming patches for Java

Oracle will issue another massive batch of updates for its products in its next Critical Patch Update, on January 14. From the pre-release announcement:

This Critical Patch Update contains 36 new security fixes for Oracle Java SE. 34 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.