Every version of Windows hit by 'critical' security vulnerability

Discuss whatever you want here--both QB and non-QB related. Anything from the DEF INT command to the meaning of life!

Moderators: Pete, Mods

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Tue Nov 15, 2016 9:03 am

How to Enable Adware or PUA Protection in Microsoft Security Essentials
In Windows 7 start the Registry Editor (regedit.exe) and go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Antimalware

Create a DWORD value named PUAProtection and set its data to 1.

Exit the Registry Editor.
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Mon Dec 12, 2016 12:27 pm

Google is replacing Flash in Chrome once and for all
This means that unless a website has an HTML5 content player, video content will not automatically display. All Flash content will be blocked, unless users manually enable it on a site-by-site basis.

At first, permission requests will only pop up on sites that users are visiting for the first time, but by October, every site will require user permission to run Flash. One percent of users on the current version of Chrome will see this feature. Everyone should have an updated Chrome by February, when the most recent beta version goes stable.
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Fri Jan 27, 2017 1:08 pm

Gmail will block JavaScript file attachments starting next month
Google will soon begin blocking Javascript attachments in Gmail in an effort to protect users form malicious attacks. The ban will take effect beginning February 13 and expands upon the service’s existing list of restricted file attachments, which also includes .exe, .msc and .bat archives.

Similar to how it handles other restricted attachments, if you try to attach a .js file to an email on or after the 13th, you'll get a notification that says it's blocked "because its content presents a potential security issue." The service will detect .js files even if they're sent in compressed form as a .zip, for example.

If you still need to send .js files for legitimate reasons, Google suggests you use Google Drive, Google Cloud Storage, or other storage solutions to share or send your files


Vista extended support ends 4/10/2017.

Perhaps you can get WEPOS or POSready updates like I do on XP:

See: How to keep Microsoft updating XP and IE 8
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Fri Mar 10, 2017 11:49 am

Microsoft reissues its infamous snooping patches for Windows 7 and 8.1
It’s good to keep Windows up to date, as it ensures you’re safe from the latest security threats, and you might benefit from other improvements. However, you shouldn’t always blindly install every patch that comes along.

Case in point are the infamous snooping patches KB2952664 (for Windows 7) and KB2976978 (for Windows 8.1), which today get yet another outing.

In the past these triggered a snooping Windows task called DoScheduledTelemetryRun, and were linked to the infamous GWX (Get Windows 10) campaign that forced OS upgrades on Windows 7 and 8.1 users. Microsoft is at pains to point out there’s no GWX or upgrade functionality in the updates now, but you still shouldn’t install them.
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Tue May 09, 2017 3:14 pm

How to check for the Intel Active Management exploit that lets hackers take over your PC
If you think you're immune from a scary exploit found in Intel's Active Management Technology just because you're a consumer, think again.

The exploit, disclosed on May 1, lets bad actors bypass authentication in Intel's remote management hardware to take over your PC. This hardware, built into enterprise-class PCs, lets IT administrators remotely manage fleets of computers—install patches and software, and even update the BIOS as though they were sitting in front of it. It is, in essence, a God-mode.


Follow the download link in the article and download guide and app for Windows 7 and 10.

Unzip and go to appropriate Windows folder and run the GUI application shown below:

Image
The console application was too fast for me to see...

My Windows XP to 10 (1511) laptop downloaded an application installer that I ran with these results:
Image
The results were not obvious to me so I followed the links for more info. LMS is listed as Not present.

LMS or Local Manageability Service may show up in Task Manager Services or Startup.
Found this way to disable LMS: Right click Start and run Command Prompt(Admin) and the following:
sc config LMS start=disabled to disable. Response may indicate service does not exist...a good thing
or:
sc delete LMS to remove. Businesses may require!
NOT LSM!!!! That is the Local System Manager.
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Mon May 15, 2017 7:36 am

Microsoft reneges on update policy to push out patch for unsupported Windows XP and Windows 8 to help defend against ransomware attack
The vulnerability does not exist within Windows 10, the latest version of the software, but is present in all versions of Windows prior to that, dating back to Windows XP.

As a result of Microsoft’s first patch, users of Windows Vista, Windows 7, and Windows 8.1 can easily protect themselves against the main route of infection by running Windows Update on their systems. In fact, fully updated systems were largely protected from WanaCrypt0r even before Friday, with many of those infected having chosen to delay installing the security updates.

Users of Windows XP, Windows Server 2003 and Windows 8 can defend against the ransomware by downloading the new patch from Windows.


WCry is so mean Microsoft issues patch for 3 unsupported Windows versions
Microsoft also rolled out a signature that allows its Windows Defender antivirus engine to provide "defense-in-depth" protection. The moves came after attackers on Friday used a recently leaked attack tool developed by the National Security Agency to virally spread ransomware known as "WCry" or "WannaCrypt." Within hours, computer systems around the world were crippled, prompting hospitals to turn away patients while telecoms, banks, and companies such as FedEx were forced to turn off computers for the weekend.


How to avoid the WannaCrypt virus if you run Windows on a Mac
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Fri May 26, 2017 9:14 am

Wanawiki is the WannaCry fix that might save affected PCs—if you work fast
Benjamin Delpy's wanawiki tool sniffs out the prime numbers used by the ransomware to reconstruct the key used to encrypt your PC. Once the wanawiki tool is run, the software can basically generate the key, and the tool will then unlock the encypted files.

There's a catch: To give the tool a chance to reconstruct the key, the infected PC cannot be rebooted. Also, wanawiki needs to be run as soon as possible, because the prime numbers the ransomware uses may be overwritten over time, Suiche wrote. Users with PCs infected by WannaCry need to download the tool, run it, and "pray" the prime numbers haven't been overwritten, according to Suiche.


Windows 10 is not vulnerable to the WannaCry ransomware!
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Mon May 29, 2017 5:22 pm

Any website can crash your Windows 7 or 8 PC with these four characters
Here’s how the bug works. All a naughty website has to do is use the character string ‘$MFT’ in the directory name where a website keeps its images. Windows expects to see the four characters $MFT only in a special metadate file on your PC. When it sees those characters as a directory name, however, it causes enough problems that an affected PC will begin to slow down and eventually hang. At that point your only recourse is to reboot the machine. In some cases, the problem may even trigger the dreaded blue screen of death (BSOD).
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Thu Jun 15, 2017 5:41 am

Microsoft warns of 'destructive cyberattacks,' issues new Windows XP patches
Last month's devastating WannaCry ransomware outbreak was just a warning shot. In an unprecedented move, Microsoft today released critical security updates to block another wave of similar attacks, making those patches available on unsupported versions like Windows XP and Server 2003.


Microsoft security advisory 4025685: Guidance for older platforms
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Fri Aug 25, 2017 8:13 am

90% of Companies Get Attacked with Three-Year-Old Vulnerabilities
According to the Fortinet Q2 2017 Global Threat Landscape, 90% of organizations the company protects have experienced cyber-attacks during which intruders tried to exploit vulnerabilities that were three years or older. In addition, 60% of organizations were attacked with exploits ten years or older.

Organizations that did a relatively good job at keeping systems patched would have been able to block the attacks.


Cybersecurity Workforce Will Be Drastically Inadequate by 2022
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Tue Aug 29, 2017 2:19 am

How to Disable SMBv1 and Protect Your Windows PC From Attack
The WannaCry and Petya ransomware epidemics both spread using flaws in the ancient SMBv1 protocol, which Windows still enables by default (for some ridiculous reason). Whether you’re using Windows 10, 8, or 7, you should ensure SMBv1 is disabled on your PC.

SMBv1 is an old version of the Server Message Block protocol Windows uses for file sharing on a local network. It’s been replaced by SMBv2 and SMBv3. You can leave versions 2 and 3 enabled—they’re secure.

The older SMBv1 protocol is only enabled because there are some older applications that haven’t been updated to use SMBv2 or SMBv3. Microsoft maintains a list of applications that still require SMBv1 here.

Read the article for the Windows 7 fix.
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Thu Sep 28, 2017 7:52 am

Internet Explorer bug leaks whatever you type in the address bar
There's a bug in the latest version of Internet Explorer that leaks the addresses, search terms, or any other text typed into the address bar.

The bug allows any currently visited website to view any text entered into the address bar as soon as the user hits enter. The technique can expose sensitive information a user didn't intend to be viewed by remote websites, including the Web address the user is about to visit. The hack can also expose search queries, since IE allows them to be typed into the address bar and then retrieved from Bing or other search services.

The flaw was disclosed Tuesday by security researcher Manuel Caballero. This proof-of-concept site shows the exploit works as described on the latest version of IE.
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0

User avatar
burger2227
Veteran
Posts: 2144
Joined: Mon Aug 21, 2006 12:40 am
Location: Pittsburgh, PA

Re: Every version of Windows hit by 'critical' security vulnerability

Postby burger2227 » Mon Oct 30, 2017 9:11 am

Hackers Can Steal Windows Login Credentials Without User Interaction
Microsoft has patched only recent versions Windows against a dangerous hack that could allow attackers to steal Windows NTLM password hashes without any user interaction.

The hack is easy to carry out and doesn't involve advanced technical skills to pull off. All the attacker needs to do is to place a malicious SCF file inside publicly accessible Windows folders.

Once the file has been placed inside the folder, it executes due to a mysterious bug, collects the target's NTLM password hash, and sends it to an attacker-configured server. Using publicly available software, an attacker could crack the NTLM password hash and later gain access to the user's computer.

Such a hack would allow an attacker that has a direct connection to a victim's network to escalate access to nearby systems.

Microsoft patched the attack vector in this month's Patch Tuesday via the ADV170014 security advisory. The patch is only for Windows 10 and Windows Server 2016 users.

Older Windows versions remain vulnerable to this attack because the registry modifications are not compatible with older versions of the Windows Firewall.


The critical settings are in the Control Panel's All Networks portion of the Advanced Sharing Settings:
Image
These were my laptop settings. Control Panel was recently REMOVED from the Start right click menu so
you will have to TYPE Control into Cortana to find it...BRILLIANT M$ EH?
Please acknowledge and thank members who answer your questions!
QB64 is a FREE QBasic compiler for WIN, MAC(OSX) and LINUX : http://www.QB64.NET
Get my Q-Basics demonstrator: https://www.dropbox.com/s/fdmgp91d6h8ps ... s.zip?dl=0


Return to “General Discussion”

Who is online

Users browsing this forum: Google [Bot], Yahoo [Bot] and 9 guests