Microsoft is distributing security patches through insecure HTTP links

Credit to Author: Woody Leonhard| Date: Fri, 16 Feb 2018 09:12:00 -0800

The Microsoft Update Catalog uses insecure HTTP links – not HTTPS links – on the download buttons, so patches you download from the Update Catalog are subject to all of the security problems that dog HTTP links, including man-in-the-middle attacks.

Security researcher Stefan Kanthak, writing on Seclist’s Bugtraq mailing list, elaborates:

Even if you browse the “Microsoft Update Catalog” via the HTTPS link,  ALL download links published there use HTTP, not HTTPS!

That’s trustworthy computing … the Microsoft way!

Despite numerous mails sent to <secure () microsoft com> in the last years, and numerous replies “we’ll forward this to the product groups,” nothing happens at all.

To read this article in full, please click here

Read more

Microsoft's free analytics service sniffs out Meltdown, Spectre patch status

Credit to Author: Gregg Keizer| Date: Thu, 15 Feb 2018 12:11:00 -0800

Microsoft’s free Windows Analytics service now scans enterprise Windows 7, Windows 8.1 and Windows 10 PCs, and reports whether they’ve been updated to defend against potential attacks exploiting the Meltdown and Spectre processor vulnerabilities.

The new capabilities of Windows Analytics’ “Upgrade Readiness” were announced Tuesday by Terry Myerson, the top Windows executive at the company. Myerson called the vulnerabilities – found by Google security researchers and reported to vendors in mid-2017 – “a new challenge for all of us” because they were in the silicon, not in software.

“We have added new capabilities to our free Windows Analytics service to report the status for all the Windows devices that [IT professionals] manage,” Myerson wrote in a post to a company blog.

To read this article in full, please click here

Read more

February patches bring ominous Outlook fixes and a rebirth of KB 2952664

Credit to Author: Woody Leonhard| Date: Wed, 14 Feb 2018 10:44:00 -0800

The very early reports are in, and it looks like this month’s monstrous panoply of patches isn’t as destructive as last month’s – so far, at least. Aside from a few reported incompatibilities, the big news involves two Outlook security holes that kick in when you download email, or preview a message. There are no known exploits, but if you use Outlook, you need to understand the dangers – and should seriously consider patching sooner rather than later.

First, the blast. Yesterday, Microsoft released its usual Patch Tuesday security updates, which include 50 separately identified security holes (CVEs). Those 50 are in addition to the one Adobe Flash Player security hole, CVE 4074595, that was plugged on Feb. 6. Of the 50, 14 are rated Critical, 34 rated Important (which means they aren’t) and two are Moderate.

To read this article in full, please click here

Read more

How artificial intelligence stopped an Emotet outbreak

Credit to Author: Windows Defender ATP| Date: Wed, 14 Feb 2018 14:43:26 +0000

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand potential victims, all of whom were instantly and automatically protected by Windows Defender

Read more

Read more

Microsoft to cover Windows 7 with advanced threat service

Credit to Author: Gregg Keizer| Date: Wed, 14 Feb 2018 04:39:00 -0800

Microsoft plans to extend support for its Windows Defender ATP service to devices running older operating systems, including Windows 7.

The decision, announced this week, is a turn-about for Microsoft, which had limited the service to Windows 10 machines. In a post to a company blog, a Microsoft director cited customers’ heterogeneous set-ups to explain the change.

“We know that while in their transition, some [customers] may have a mix of Windows 10 and Windows 7 devices in their environments,” wrote Rob Lefferts of the Windows group’s security and enterprise team. “We want to help our customers achieve the best security possible on their way to Windows 10 ahead of the end of support for Windows 7 in January 2020.”

To read this article in full, please click here

Read more

Get Windows Update locked down in preparation for this month’s problems

Credit to Author: Woody Leonhard| Date: Mon, 12 Feb 2018 06:44:00 -0800

Read more

Hold your breath, avoid the snake oil, and get Windows updated

Credit to Author: Woody Leonhard| Date: Mon, 05 Feb 2018 09:50:00 -0800

January 2018 was a month that will go down in patching infamy. Looking back on my notes, we had patches released, yanked, re-released and/or re-re-released on 15 different days in January. Untold thousands of machines were bricked by Microsoft patches. Millions of hours were lost chasing down bad patches and bad advice.

Although there were a couple of real bugs fixed in the January patches — the Equation Editor vulnerability being suspect #1 — most of the angst was completely superfluous. The Meltdown/Spectre patches at the heart of the drama attacked a problem that wasn’t — and isn’t — there. We still have no known Meltdown or Spectre exploits in the wild. None.

To read this article in full, please click here

Read more

Perfect end to a perfect month: Yet another Win10 1709 cumulative update, KB 4058258

Credit to Author: Woody Leonhard| Date: Wed, 31 Jan 2018 12:46:00 -0800

Microsoft told us three weeks ago that Win10 Fall Creators Update, version 1709, was ready for enterprise deployment. Since then, we’ve seen the early January patch yanked because it tanked AMD machines. Then, after the first patch was reinstated, we got two more cumulative updates. In the past three weeks.

I guess that’s what Microsoft now means by “Current Branch for Business” and/or “Semi-Annual Channel.”

To read this article in full, please click here

Read more