New WannaCry variant being monitored, DHS official says

Credit to Author: Matt Hamblen| Date: Mon, 15 May 2017 11:40:00 -0700

A variant of the WannaCry ransomware that emerged Monday has been able to infect some of the computers patched after the original malware struck last week, according to a top cyber official at the Department of Homeland Security (DHS).

“We’re working on how to address that [variant] and sharing as we can,” said the official who asked not to be named. The official did not say how many computers have been affected by the variant, other than to say “some.” The original WannaCry attack hit more than 200,000 computers starting Friday in more than 150 countries, UK officials said over the weekend.

To read this article in full or to leave a comment, please click here

Read more

Patching Windows XP against WannaCry ransomware

Credit to Author: Michael Horowitz| Date: Sun, 14 May 2017 12:56:00 -0700

Microsoft just released a patch for Windows XP that fixes a file sharing flaw being exploited by the WannaCry ransomware. Here’s how to install it. 

You can download some versions of the patch using links at the bottom of this May 12th  Microsoft article: Customer Guidance for WannaCrypt attacks. The full list of patch variants, including languages other than English, is in the Windows Catalog, just search for KB4012598. Windows Update does not work on XP.

To read this article in full or to leave a comment, please click here

Read more

Microsoft issues first Windows XP patch in 3 years to stymie 'WannaCrypt'

Credit to Author: Gregg Keizer| Date: Sun, 14 May 2017 11:00:00 -0700

Microsoft on Friday took the unprecedented step of issuing patches for long-demoted versions of Windows, including Windows XP, to immunize PCs from fast-spreading ransomware that has crippled machines worldwide.

To stymie “WannaCrypt” attacks — which encrypted files on thousands of PCs used by the U.K.’s National Health Service (NHS), causing chaos in many hospitals — Microsoft published patches for Windows XP, Windows 8 and Windows Server 2003. All had been retired from support: Windows XP in April 2014, Windows 8 in June 2016, Windows Server in July 2015.

“We are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003,” said Phillip Misner, a principal security group manager at the Microsoft Security Response Center (MSRM), in a post to a company blog late Friday.

To read this article in full or to leave a comment, please click here

Read more

Microsoft posts PowerShell script that spawns pseudo security bulletins

Credit to Author: Gregg Keizer| Date: Fri, 12 May 2017 11:48:00 -0700

A Microsoft manager this week offered IT administrators a way to replicate — in a fashion — the security bulletins the company discarded last month.

“If you want a report summarizing today’s #MSRC security bulletins, here’s a script that uses the MSRC Portal API,” John Lambert, general manager of the Microsoft Threat Intelligence Center, said in a Tuesday message on Twitter.

Lambert’s tweet linked to code depository GitHub, where he posted a PowerShell script that polled data using a new API (application programming interface). Microsoft made the API available in November when it first announced that it planned to axe the security bulletins it had issued since at least 1998.

To read this article in full or to leave a comment, please click here

Read more

IDG Contributor Network: May Patch Tuesday delivers fixes critical Windows 10 exploits

Credit to Author: Greg Lambert| Date: Fri, 12 May 2017 10:29:00 -0700

For this May Microsoft Patch Tuesday, we see Microsoft attempt to resolve 56 reported vulnerabilities in Microsoft Office, Windows, both Browsers and the .NET development platform.

Three of the vulnerabilities have been reported publicly and several have been actively exploited. Adding to an already serious situation, Microsoft’s anti-malware tool was compromised, resulting in the inadvertent deployment of malware through the anti-malware engine.

Microsoft responded very quickly with an out-of-band update (Security Advisory 4022344). Though there was general relief and kudos to Microsoft for their rapid response to this embarrassing episode, this bug was described as the “worst in recent memory” and as “crazy bad” by two of the lead researchers from Google’s Project Zero.

To read this article in full or to leave a comment, please click here

Read more

Third party antivirus programs interfere with Windows Defender critical patch

Credit to Author: Michael Horowitz| Date: Wed, 10 May 2017 15:37:00 -0700

Like others running Windows, I have been dutifully updating Window Defender the last few days with a fix for a critical bug. The update procedure is simple. Open the Control Panel, click on Windows Defender, and then check for updates.

The only thing out of the ordinary, on Windows 7, is that the update check is hidden behind a downward pointing triangle just to the right of a white question mark (this is not true in Windows 8 or 10). The “about” panel is also here. If the Engine Version is less than 1.1.13704.0 then it needs to be updated immediately.

To read this article in full or to leave a comment, please click here

Read more

Microsoft asks Windows 10 Enterprise customers to test new anti-exploit tech

Credit to Author: Gregg Keizer| Date: Thu, 04 May 2017 12:58:00 -0700

Microsoft today asked enterprise customers to test a new anti-malware, anti-exploit technology in Windows 10’s baked-in browser.

Windows 10’s latest preview, tagged as build 16188 and released Thursday, includes Windows Defender Application Guard, a virtualization-based feature that isolates the contents of a tab in Edge, the OS’s default browser, from the rest of the system.

While Application Guard was announced in September, and went through limited testing in the months since, today marked its first appearance to all Insiders running Windows 10 Enterprise. Users must manually toggle on Application Guard from a setting dialog, then open a tab within Edge by selecting “New Application Guard Window” from the browser’s menu.

To read this article in full or to leave a comment, please click here

Read more

Developer lifts Windows 7's update blockade with unsanctioned patch

Credit to Author: Gregg Keizer| Date: Thu, 20 Apr 2017 13:28:00 -0700

An anonymous developer has published a patch that negates Microsoft’s barring of security updates from Windows 7 and 8.1 PCs equipped with the very newest processors.

The developer, identified as “Zeffy,” posted the patch and accompanying documentation on GitHub, the code repository.

“I was inspired to look into these new rollup updates that Microsoft released on March 16 [after reading about the processor-related blocking of Windows Update],” wrote Zeffy. “[That was] essentially a giant middle finger to anyone who dare not ‘upgrade’ to the steaming pile of garbage known as Windows 10.”

To read this article in full or to leave a comment, please click here

Read more