New Surface Pro 4 driver restores Windows Hello — and this time it’s documented

Credit to Author: Woody Leonhard| Date: Fri, 04 Aug 2017 03:43:00 -0700

Last night, Microsoft released a new Surface Camera driver called “Surface – System – 7/31/2007 12:00:00 AM – 1.0.75.1” which is intended to fix the Windows Hello problem introduced by the completely undocumented driver “Surface – System – 7/21/2017 12:00:00 AM – 1.0.65.1.” Many of you complained that, after installing the buggy driver, your Surface Pro 4 no longer supported Windows Hello.

As best as I can tell, this 1.0.75.1 driver update fixes the problem. But there’s more to the story.

The original, buggy driver was dated July 21, the files were dated July 26, and the driver was sent down the Automatic Update chute on July 29 without warning or description.

To read this article in full or to leave a comment, please click here

Read more

Microsoft releases KB 3213643, 2956078, 4011078, 4011052 to fix June Outlook security bugs

Credit to Author: Woody Leonhard| Date: Thu, 27 Jul 2017 14:00:00 -0700

Read more

Tiptoe through the bugs and get Windows and Office updated

Credit to Author: Woody Leonhard| Date: Wed, 26 Jul 2017 09:55:00 -0700

The fourth Tuesday of the month has come and gone, and it now looks reasonably safe to patch Windows and Office. I was expecting two big releases yesterday — one to fix numerous bugs in Win10 Creators Update, version 1703; the other to plug the bugs introduced by June’s Office security patches — but neither trove appeared. Given Microsoft’s past patterns, it’s unlikely that we’ll see any more serious patches until next month’s Patch Tuesday, on Aug. 8.

There’s also a bit of additional impetus right now. On July 17, security researcher Haifei published a proof of concept for running malware scripts directly in Office apps. I haven’t seen any exploits in the wild as yet, but it would be a good idea to install KB 3213640 (Office 2007), KB 3213624 (Office 2010), KB 3213555 (Office 2013) and/or KB 3213545 (Office 2016) in the short term. (Thx to @LeaningTowardsLinux.) Note that none of these patches, as best as I can tell, correct the Office bugs introduced in June.

To read this article in full or to leave a comment, please click here

Read more

Where are the fixes to the botched Outlook security patches?

Credit to Author: Woody Leonhard| Date: Fri, 21 Jul 2017 05:39:00 -0700

On June 13—five and a half weeks ago—Microsoft released a series of buggy patches for Outlook. We know they’re buggy because Microsoft acknowledged seven bugs (including one primarily caused by bugs in Windows patches) in those four original June 13 security patches. As of this morning, we still don’t have fixes for those seven bugs.

Here are the known buggy original security patches:

  • KB 3191898 – Security update for Outlook 2007, released June 13, 2017
  • KB 3203467 – Security update for Outlook 2010, released June 13
  • KB 3191938 – Security update for Outlook 2013, June 13
  • KB 3191932 – Security update for Outlook 2016, June 13

If you have Automatic Update turned on, you were treated not only to those patches, but to all of these three later, interim fixes for the bugs in the security patches. Don’t get too excited about them. In fact, they didn’t fix the bugs:

To read this article in full or to leave a comment, please click here

Read more

More June security patch bugs: You can patch an IE flaw, CVE-2017-8529, or print inside iFrames—but not both

Credit to Author: Woody Leonhard| Date: Wed, 19 Jul 2017 12:00:00 -0700

Strap on your hip waders. This particular “scare” article should have you thinking yet again about the advisability of installing Windows updates as soon as they’re available. As you’ll see, Microsoft itself has flip-flopped on the resolution and those who subscribe to Windows Update have been taken along for the ride.

Buggy June patches to Windows, Internet Explorer and Edge left customers in the horns of a dilemma:

  • You can plug a security hole known as CVE-2017-8529, in which IE or Edge reveal the presence of a specific file on your computer when you simply surf to a compromised web site, OR
  • You can print content on web pages that are inside an HTML construct known as an iFrame, using IE 9, 10 or 11.

Microsoft’s up against a hard bug that makes this an either-or proposition: Until Microsoft figures out how to fix both problems at the same time, either you patch the security hole, or you can print inside iFrames with IE, but not both.

To read this article in full or to leave a comment, please click here

Read more

More June security patch bugs: You can patch an IE flaw, CVE-2017-8529, or print inside iFrames — but not both

Credit to Author: Woody Leonhard| Date: Wed, 19 Jul 2017 12:00:00 -0700

Strap on your hip waders. This particular “scare” article should have you thinking yet again about the advisability of installing Windows updates as soon as they’re available. As you’ll see, Microsoft itself has flip-flopped on the resolution and those who subscribe to Windows Update have been taken along for the ride.

Buggy June patches to Windows, Internet Explorer and Edge left customers in the horns of a dilemma:

  • You can plug a security hole known as CVE-2017-8529, in which IE or Edge reveal the presence of a specific file on your computer when you simply surf to a compromised web site, OR
  • You can print content on web pages that are inside an HTML construct known as an iFrame, using IE 9, 10 or 11.

Microsoft’s up against a hard bug that makes this an either-or proposition: Until Microsoft figures out how to fix both problems at the same time, either you patch the security hole, or you can print inside iFrames with IE, but not both.

To read this article in full or to leave a comment, please click here

Read more

Microsoft yanks bad Outlook patches of patches KB 3191849, 3213654, 401042

Credit to Author: Woody Leonhard| Date: Sat, 15 Jul 2017 13:16:00 -0700

Read more

Verifying and testing that Firefox is restricted to TLS 1.2

Credit to Author: Michael Horowitz| Date: Sun, 16 Jul 2017 12:56:00 -0700

TLS is the protocol invoked under the covers when viewing secure websites (those loaded with HTTPS rather than HTTP). There are multiple versions of the TLS protocol, and the most recent version, 1.2, is the most secure. Last time, I discussed tweaking Firefox so that it only supports TLS version 1.2 and not the older versions (1.0 and 1.1) of the protocol.

But that begs the question: what happens when a security-reinforced copy of Firefox encounters a website that does not support TLS 1.2? The answer is shown below.

To read this article in full or to leave a comment, please click here

Read more