We seem to write a post on this once a month minimum. When opening this weeks Cert advisory there were 14 9.3 vulnerabilities for Adobe Reader and Acrobat. This plague of vulnerabilities and the related exploits that have popped up remind me of Internet Explorer 5 years ago. So here at Managed Solutions we are once again advising our clients to apply any updates to Adobe products when prompted or to exercise extra caution with .pdf files. Here is the menacing list of vulnerabilities announced on 6/30/2010:
Quick Tip MrFixit for Windows Update Issues
Have you ever encountered errors with Windows Update or had it just stop prompting you all-together? This might be the solution to your problem. Either way it is a web page at Microsoft that will provide the right tool depending on what Operating system you are running.
To run the utility navigate to http://support.microsoft.com/kb/971058 and click on the Microsoft Fix It icon or link:
You will have one option that can be selected, only use this option if the first attempt without it checked was not successful:
After running the utility in either mode an additional screen will pop up with other options:
If after a restart you still experience issues, you can run the utility again to access the help links in the utility. Microsoft does provide free support for windows update issues.
Anatomy of a Phishing Email
I encountered a great opportunity this evening, the opportunity to share an inside look of a Phishing Email. What is Phishing?
“In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.” – Wikipedia
What I noticed was an Email purportedly from Bank of America telling me that there was an “Account Resolution Required”:
I scanned over to the preview pane and noticed that it had a link that appeared to be correct, so I hovered over the link to see if the link was spoofed and to no big surprise, it was. Here is how the message looked in my preview pane, I did not download pictures because that is a popular way for spammers/crooks to confirm Email addresses of their targets/victims:
Let me further clarify in lay terms, the link that reads:
https://www.bankofamerica.com/home/1244618/ddjdfdkfi126.aspx?screenid=Update_Acct
is actually:
http://prostyle-esports.nl/index.php
and this is evident when I hover over, or place my mouse cursor on the “alleged” link. This is a tactic you can use to check links you are unsure of. However I should clarify that it doesn’t always work. There have been occasions where this has been spoofed effectively typically it has to do with the Email client or Browser and security patches on your computer.
Testing the Link
Using a test environment I pasted the link to see what the target site looked like:
I was pleased to see it had been blocked, this saved me the time of researching and Emailing the Internet Provider involved. After confirming this I used “properties” on Outlook to get the header information, there is a lot of information but plenty of clues to let me know that this message was not authentic (had everything else appeared right, which most certainly the SSL certificate warning would have popped up unless it was an unprecedented forgery!). Here are a few of the more obvious lines I parsed from the headers:
Received: from User ([82.128.0.69]) by post.strato.de (mrclete mo25) (RZmta
23.3) with ESMTP id 20016am5E507CT ; Mon, 14 Jun 2010 07:43:29 +0200 (MEST)
Reply-To:
From: Bank of America
In the above examples, you can see that the message replay and from don’t match and that the mail server is post.strato.de not a likely mail server for Bank of America (perhaps for Deutsche Bank next time guys?). Also after running the IP address of the sender 82.128.0.69 on Arin.net I was able to determine that it was a European Address (which I had already figured due to the .de domain on the mail server, but it was further validation):
There are a lot of ways to spot fraudulent/Phishing Emails. Our advice to our clients is if they are not 100% certain we recommend they forward the messages to us for analysis. Most of these kinds of messages are blocked and we don’t see them, but if something doesn’t look quite right it probably isn’t.
Update Microsoft Office Products – Joe Reviews SB10-074 Cert Report (Video)
Here is a review of this weeks Cert Advisory. This update contains the infamous Arucer.dll that came with the charging software on the Energizer Duo USB. Also definitely recommend updating your Microsoft Office products if you haven’t recently. This is a weekly feature here at Managed Solutions. If you have questions about this video post a comment here or ask on our Facebook Fan Page.
Update Adobe Acrobat, Again – Joe Reviews SB10-060 Cert Report (Video)
Here is a review of this weeks Cert Advisory. Adobe Acrobat has returned, please be sure to update! This is a weekly feature here at Managed Solutions. If you have questions about this video post a comment here or ask on our Facebook Fan Page.
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- Next Page »