Category Archives: Microsoft

February security roundup

In February, a security researcher discovered that a Silverlight exploit – patched by Microsoft in January – is now being distributed through the Angler hacking kit. The researcher also found web sites using the exploit to infect site visitors who have not yet installed the Silverlight patch.

Comodo Internet Security, a highly-rated security package, was found to include features that actually make the host computer less secure. Most notably, that included a VNC server running without a password. VNC is a remote desktop application. The problems were resolved in subsequent updates from Comodo.

Brian Krebs wrote about serious security issues found in some Internet-connected Trane thermostats, and warns buyers to use caution when purchasing ‘smart’ devices.

Windows 10 Insider Preview Build 14267

For those of you interested in the Windows 10 Insider Preview builds, the latest is build 14267, which was announced on February 18.

Build 14267 finally fixes the WSClient.dll error dialogs that were popping up in previous builds. Problems with certain front-facing cameras have been fixed. The ‘Reset this PC’ function is once again working properly with this build.

It’s now easier to use Cortana to identify playing music. There are several improvements to Edge, including Favorites management, an option to clear browsing data on exit, and better download management.

Windows 10 Insider Preview Build 14257

My Windows 10 testing computer is still on the Windows Insider Preview ‘Fast Ring’, which means it gets the very latest Windows 10 preview builds as soon as they become available.

The test machine was just updated to preview build 14257. This build includes a lot of bug fixes, including one for a nasty app crashing problem related to memory management. The WSClient.dll error dialog box problem has not yet been resolved.

Microsoft finally providing Windows 10 update history

Responding to a steady stream of complaints since the launch of Windows 10, Microsoft has finally relented and will now provide useful notes to accompany changes to the operating system.

The Windows 10 update history page shows changes to release versions, starting with the initial release (build 10240.16683) in July, and ending with the most recent release version, 10586.104.

The notes for release 10586.104 show that a serious security flaw related to InPrivate browsing in the Edge browser has now been fixed.

Patch Tuesday for February 2016

Thirteen security updates from Microsoft this month address over forty issues in Windows, Internet Explorer, Edge, Office, server software and .NET. Six are flagged as Critical.

In keeping with their recent practise of tagging along with Microsoft, Adobe also just released several updates, most notably for Flash. The latest version of Flash is now 20.0.0.306. As usual, Internet Explorer on Windows 8.1 and 10 and Edge on Windows 10 will get their new Flash via Windows Update, and Chrome will update itself with the latest Flash. The associated security bulletin gets into all the technical details. A total of 22 vulnerabilities are addressed in the new version.

EMET 5.5 now available

Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) version 5.5 was released on February 2.

EMET is not a substitute for anti-malware software, but it does provide an additional layer of security against typical malware activity. If malware finds its way onto your Windows computer, EMET can prevent it from causing actual damage; by default, it kills the affected process.

EMET is free, and recommended. Unfortunately, when you use EMET, there’s a chance that it will cause problems for legitimate software. A few weeks ago – before EMET 5.5 was released – EMET started reporting problems with my main computer’s Office software, including Outlook and Excel. I was forced to disable some of EMET’s detection settings for those programs. I had hoped that EMET 5.5 would resolve these issues, but it did not.

Still, EMET can be a useful addition to your security toolkit, if you’re willing to put up with the occasional glitch.

Windows 10 now classed as ‘recommended’ update for Windows 7 and 8.1

As expected, Microsoft recently changed the status of the Windows 10 update for Windows 7 and 8.1 computers, from ‘optional’ to ‘recommended’. If your PC’s Windows Update settings are configured to automatically install recommended updates, Windows 10 will be downloaded, silently consuming multiple gigabytes of bandwidth and hard drive space.

Thankfully, the Windows 10 upgrade won’t actually be installed without your consent; users will be given a chance to skip or reschedule the upgrade. You can also avoid the update completely by making some changes to the Windows registry, or by using the excellent GWX Control Panel.

Security and privacy roundup for January 2016

Your devices are talking about you

You already know that your web browser is tracking your activity. You are probably also aware of ‘The Internet of Things‘ – the increasing prevalence of devices that are connected to the Internet – and you recognize that any such device can also track your activities. Bruce Schneier reveals the next step in this evolution: enabling devices to share information about you. Of course, since the goal of all this surveillance is merely better-targeted advertising, most people are unlikely to care. Still, if privacy and control are important to you, this will not be welcome news.

Brian Krebs reminded us that ransomware can affect files in your cloud storage space as well as on your physical computer and network-connected devices.

A summary of software vulnerabilities over at VentureBeat shows Mac OS X topping the list for 2015. Microsoft’s security efforts seem to be paying off, as the highest-ranked version of Windows on the 2015 list is Windows 8.1 at number 10, and fewer than half the vulnerabilities as OS X.

Serious vulnerabilities were discovered in OpenSSH (a very commonly-used secure terminal client), OpenSSL (the ubiquitous security library), and Trend Micro antivirus software.

Vulnerabilities in the Linux kernel (affecting Android phones and Linux PCs) remain unpatched on many affected devices.

Google produced more patches for vulnerabilities affecting Android devices, but as always, the patches are finding their way to devices very slowly.

The very weak hashing functions MD5 and SHA1 are still being used in HTTPS encryption in some contexts.

It’s official: your smart TV can become infected with malware.

Network devices made by Juniper and Fortinet were found to contain serious vulnerabilities, including an NSA-developed back-door function and a hard-coded back-door password (more).

The free-to-use deep search tool Shodan made the news when researchers showed that it can be used to find household cameras, including baby-cams. Note that the problem here is not Shodan, which is just a useful search tool. The problem is the failure to properly secure Internet-connected devices.

There were more serious corporate security breaches in January, at Time Warner and Linode. As usual in these cases, the login credentials of subscribers were obtained by the attackers.

Amazon’s security practices were (unwillingly) tested by a customer, and found seriously deficient.

More malicious apps were found in the Google Play store. Google removed those apps, but not until they were downloaded millions of times by unsuspecting Android device users.

LG fixed a critical security hole affecting as many as ten million of its mobile devices.