Wednesday, December 11, 2013

December’s Patch Tuesday

patchtuesday

 

It’s the last Patch Tuesday of the year!  Microsoft released patches for 24 vulnerabilities yesterday along with 11 security bulletins.  For the Patch Tuesday bulletin click here.

 

Critical Bulletins include:

 

Bulletin MS13-097 which is regarding Internet Explorer.  This fix prevents users being exploited by maliciously crafted web pages.

 

Bulletin MS13-098  is to assist with attackers being allowed to add their own malware to software being installed on a computer over a network.

 

Bulletin MS13-099 is about vulnerability in the Windows Script functionality that allows remote attackers access though a website that hosts special content.

 

Bulletin MS-105 is to take care of problems with Outlook Web Access that could allow an attacker to gain access to Microsoft Exchange.

 

Adobe Patches

 

Adobe also release a patch for Flash and Shockwave Player

 

An attacker could try to get you to run malicious Flash or Shockwave content from a website or from content embedded within some documents.  To install these updates go to for Shockwave click here and for Adobe Flash update click here.

 

Remember

 

Windows XP machines will no longer be supported by Microsoft as of April, 2014.  Microsoft will stop issuing security patches or fixes for known issues leaving your computer and/or network at risk.  Be proactive and replace your XP machines prior to April, 2014. 

 

Summary:

The latest patches from Microsoft illustrate the need for companies to initiate automated patching as well as move from older versions of Microsoft Software that pose security risks. 

Keeping your computer up to date is critical for your systems security.  Keep in mind that if have our GT Proactive Care all patches and updates would be done automatically for you.  If you have any questions regarding the latest round of updates or GT Proactive Care, please call us. (516) 762-0155.

Wednesday, November 13, 2013

November’s Patch Tuesday

 

patch tuesday

 

 

Yesterday’s Patch Tuesday brought lots of updates.  One of the key updates was a fix for Adobe’s Flash Player Software for Windows, Mac, Linux and Android devices.  If you have Windows 8, you will want to update manually if your Flash is not set to update automatically.  This update of Flash is version 11.9.900.152.  You can download the latest version of Flash by clicking here.

 

Also there are 5 important Microsoft updates to fix vulnerabilities in Microsoft Active X Control, Graphics Device Interface overflow, Ancillary function driver and Digital Signature Handling.  There are also fixes for Multiple word Memory Corruption Vulnerabilities and the Outlook S/MIME information disclosure flaw.  To get to these updates you can go to this page or go to automatic updates and choose for your updates to run automatically.  If your computer is set to automatic your computer was probably already updated.

 

**Note to Windows XP users.  Tuesdays updates have cause some issues with the SVChost.exe taking up all of the CPU usage.  If you experience this problem, please call our office.  516-762-0155. 

 

Keeping your computer up to date is the best way for it to function optimally.  Keep in mind that if you have Glasser Tech’s Proactive Care all patches and updates would be done automatically for you.  If you have any questions regarding November’s updates or Proactive Care, please feel free to call us. 516-762-0155.

 

Wednesday, November 6, 2013

Be aware of attackers exploiting TIFF Image Files

Tiff

 

On November 5, 2013, Microsoft release a critical advisory warning customers of a vulnerability regarding TIFF images. 

 

Basically it has to do with how versions of Windows, Office and Lync handle TIFF images.  If you are lured into viewing a malicious image, including ones that are already embedded into Office documents, code can be executed on your computer that would allow the attacker to gain control of your computer.

 

Mostly these images have been arriving as malicious Word documents that have an embedded TIFF in them.  They would probably be sent to you in an email. 

 

Microsoft is working on a patch for this.  However, in the meantime, they have released a FixIt which you can apply.  While a FixIt is not considered a full patch, it is helpful.  When bulletins arrive like this, we can easily block TIFF images for you if you had a Watchguard Firewall.  To find out more about Watchguard Firewalls, please give us a call at Glasser Tech at 516-762-0155.

Friday, October 18, 2013

D-Link Router Backdoor Security Alert




D-Link will address by the end of October a security issue in some of its routers that could allow attackers to change the device settings without requiring a username and password.  The issue consists of a backdoor-type function built into the firmware of some D-Link routers that can be used to bypass the normal authentication procedure on their Web-based user interfaces.  D-Link will release firmware updates to address the vulnerability in affected routers by the end of October, the networking equipment manufacturer said via email.  This backdoor poses a threat because any user who connects to the wireless or any piece of malware running on a computer inside the network can exploit it to make unauthorized changes to the router’s configuration. Such changes can have serious security consequences.  For example, changing the DNS (Domain Name System) servers used by the router—and inherently every device on the network—with DNS servers controlled by an attacker would enable the attacker to redirect users to rogue websites when trying to access legitimate ones.  If you receive unsolicited emails that relate to security vulnerabilities and prompt you to action, please ignore it.  When you click on links in such emails, it could allow unauthorized persons to access your router. 

It is our recommendation to utilize a Business Class Firewall instead of a Router meant for home use.  Low cost home routers have features that automatically open potential security holes (UPNP).  While the UPNP feature makes it easy to get an XBOX Game Console or home automation thermostat working on the internet, a malicious piece of software could open your whole network to the world.  Firewalls inherently have enhanced security features that protect the network.  Firewalls such as the one we utilize (WatchGuard) do not have UPNP and include subscription services that allow us to proactively protect the network including blocking known and emerging malicious websites and antivirus scanning of all downloaded files.  Here is a link that describes some of the services available for the WatchGuard Firewall.  

We strongly suggest you take a Proactive approach rather than a Reactive approach.    
Call us to find out more about solutions to protect your network and your data.


Michael Glasser, Glasser Tech LLC (516) 762-0155

Monday, September 30, 2013

Beware of new malware that holds your data hostage

lock on files

 

You probably have had some exposure to spyware, malware and viruses.  There are the typical spyware/malware instances that have been around for years that display tons of pop ups or look like an antivirus program that is telling you that you have spyware and you should scan with their scan.  Then there is spyware/malware that locks up your desktop by displaying a message that the government is watching you.  But this new malware causes so much damage it can be put into a category all by itself.

 

What is does is this:  It looks at your local and network drives and share folders and will ENCRYPT files matching a set of extensions from common applications that you probably use.  These include Word, Word Perfect, Excel, etc. 

 

What this means:   You can’t get into ANY of your files. 

 

How it gets in:  Malware/spyware comes in through e-mail attachments, drive-by downloads from websites that are infected, a trojan-downloaded or backdoor scenario or manual infiltration though remote desktop protocol.

 

What can you do? 

 

1)  First, be sure that you are checking your back up every day.  A good backup is the best chance for restoration of your data. 

 

2) You should also have a firewall to proactively block known websites that tend to be infected. 

 

3) All of your computers should be up to date with the latest windows updates installed. 

 

4) Restrict all Users from being able to install Applications to their computers.  While some users may find this annoying, we have found that this reduces the risk of a network breach/compromise.

 

5) Patch Management.  Patch management would automatically apply updates such as Windows, Flash, Java, Acrobat Reader, etc.  Quite often we find clients that do not have Patch Management have security holes because not all users are applying all the patches.

 

Let us help you pro-actively block spyware, malware and viruses.  Call Glasser Tech at 516-762-0155

Thursday, September 19, 2013

Microsoft Releases Critical Temporary Fix for Internet Explorer



Microsoft “Fix it”

Vulnerability affects: All Internet Explorer Versions.


How an attacker exploits it:  Microsoft says:  "This would typically occur when an attacker compromises the security of trusted websites regularly frequented, or convinces someone to click on a link in an email or instant message" 


Impact:  In the worst case, an attacker can execute code on your user’s computer, potentially gaining complete control of it.



The ‘Fix it' applies only to 32-bit versions of Internet Explorer.  If you are running 64-bit, the ‘Fix it' cannot be applied.

Three Other Microsoft Recommendations on the Advisory:  

1) "Enable the MHTML protocol lockdown"

2) "Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones"

3) "Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone."

In its advisory, Microsoft said that it was actively working to release a patch for the issue, either in its next monthly security update – due out Oct. 8 – or in an out-of-cycle release.

Clients with our Proactive Solution to Patch Management Automatically get the Updates.  

Contact us to find out how you can become "Proactive" instead of "Reactive".

Michael Glasser, Glasser Tech LLC (516) 762-0155

Wednesday, September 11, 2013

What’s important for you to know about this month’s Patch Tuesday

patches

 

Patches are available this month for Microsoft, Adobe and Java.

 

First, let’s start with Adobe.

 

This month’s patches are for Reader (and Acrobat) Adobe Flash Player and Shockwave Player.

 

To reach the appropriate patches for Adobe, click on these links.

 

· APSB13-23: Two Shockwave Player Memory Corruption Vulnerabilities

· APSB13-22: Multiple Reader and Acrobat  Vulnerabilities

· APSB13-21: Four Flash Player Memory Corruption Flaws

 

There were also updates released for Microsoft’s Office and Internet Explorer

 

September’s Microsoft Patch includes fixes for 47 issues and 13 bulletins.  A list of these updates can be found at Microsoft Security Bulletin Summary for September 2013.

 

Some of the more important vulnerabilities include:

· MS13-070: OLE Code Execution Vulnerability

· MS13-071:  Windows Theme Code Execution Vulnerability

· MS13-076: Multiple Kernel-Mode Driver Elevation of Privilege Vulnerabilities

· MS13-077:  Service Control Manager Elevation of Privilege Vulnerabilities

· MS13-079:  Active Directory DoS Flaw

 

Also have you updated your Java recently?

 

The website theregister.co.uk states that 81 percent of businesses run outdated Java.  What is Java?  Java is a programming language.  Many websites need Java to run properly. 

 

You should download the latest version of Java by going to their website java.com

 

Updates are important because they protect you from vulnerabilities.  When your computer is updated, you are less apt to be hacked. 

Tuesday, August 13, 2013

Internet Explorer Gets Another Patch

 

IEbandaid

 

The latest IE Patch fix is to protect all versions of Internet Explorer.  Currently attackers are trying to exploit users by luring them to web pages containing malicious content.  If your users go to these sites an attacker can execute code that allows them to control the computer. 

What can you do?   Install any of Microsoft’s Internet Explorer updates immediately. 

If you want to see Microsoft’s complete security bulletin describing the 11 holes fixed by the recent update, Click Here.

If you feel uncomfortable doing updates yourself and would like us to assist you.  Please call Glasser Tech at 516-762-0155. 

Wednesday, June 19, 2013

Get your Java fix here

 

Java

 

Java has released a fix for 40 vulnerabilities (including Apple)

These vulnerabilities affect the Oracle Java Runtime Environment (JRE) and Java Development Kit (JDK) 7 Update 21 and earlier on all platforms.

An attacker can exploit users by luring them to a malicious web page containing specially crafted Java. 

The best thing to do is Install JRE and JDK 7 Update 25 (or Apple’s OS X update)

Oracle released JRE and JEK Update 25 to correct 40 vulnerabilities which they consider to be high risk.  Most of the flaws are remote code execution issues in the worst case scenario, this malicious code could allow someone to take control of your computer.   If you own an Apple Computer, Apple has released a Java update for OS X.  Mac users should update their Java as well.

If you use Java, download and install the Java update to protect your computer.  You may often see pop-ups on your screen asking you to update Java.  If you do, please do the update.  Otherwise you can get to the update by clicking this link  Oracle's June Java Security Advisory.

If you don’t use Java, uninstall it.

If you need help with this update, please contact our office, Glasser Tech 516-762-0155. 

Tuesday, June 11, 2013

Critical IE update is released as part of June’s Patch Tuesday.

Patch IE

June 11, 2013

As part of Today’s Patch Tuesday, Microsoft has released five security bulletins, one for Internet Explorer (IE), three for Windows and it’s components and one for Microsoft Office. 

The Internet Explorer patch is rated critical.  We suggest that if your computer hasn’t already updated automatically that you run windows updates to fix these Internet Explorer issues. 

This patch fixes 19 vulnerabilities, most of them could allow attackers to gain control of your computer. 

To find out more about this particular Microsoft patch Click Here

Thursday, May 16, 2013

Microsoft releases patches for Word

 

Word

If you use Word in your office for Word Processing, you should know that this week  Microsoft released a patch for a vulnerability within Word having to do with RCE which stands for remote code execution. 

An attacker may entice one of your users to download and open a document that includes malicious code.  This might grant an attacker full access to the end user computer.  This flaw affects Word and Word Viewer 2003.  You can update Word using the following patch:

MS13-043

IE Vulnerability

IE

 

As part of Microsoft’s Patch day, two security bulletins were released regarding security issues with Internet Explorer.  Both updated are rated critical.  

The new flaws are that  attackers can lure of of your users to a web page containing malicious HTML.  Because of this, an attacker can exploit these vulnerabilities and execute code on the end user’s computer. 

As always, it is important to download and install Windows updates or set your computer to do it automatically to install the latest patches and prevent problems.  The two security bulletins are as follows:

MS13-037

MS13-038

Thursday, March 14, 2013

Adobe releases patch for 4 Flash Security Holes

Flash player

If you have Adobe Flash Player 11.6.602.171 and earlier, running on any platform you need to install the latest patch to avoid possibly being enticed to visit a website containing malicious Flash content.  The the worst case scenario, an attacker can execute code on your computer potentially gaining control of it.  

The fix is easy.  Download the latest version of Adobe Flash Player Click Here

Adobe has rated this update a Priority 1 for windows users and recommends you apply the update as soon as possible.   If you’ve enabled Flash Player’s recent “silent update” option, you will receive this update automatically.

Wednesday, March 13, 2013

Microsoft Patch Tuesday-March 2013

patch tuesday2

 

Most of the patches this month are for Microsoft Office.   Click here to see the official Microsoft release

The most important vulnerabilities are listed below:

There is a Cumulative Security Update for Internet Explorer 6-10. 

There is an Update for Silverlight for vulnerability that could allow Remote Code Execution.

An update for a vulnerability in Microsoft Visio Viewer 2010 that could allow Remote Code Execution

There are vulnerabilities in SharePoint that could allow Elevation of Privilege

An update for a Vulnerability in Microsoft OneNote that could allow information disclosure

Vulnerabilities in Office Outlook for MAC that could allow information disclosure

Vulnerabilities i Kernel-Mode Drivers that could allow elevation of Privilege

You can watch a webcast of this Security Bulletin release by clicking here .

Keeping your machine current by running Windows updates makes your machine more secure.  This can also be done automatically through GlasserTech’s ProActive Care.  With ProActive Care, we update your computer for you.  For more information on ProActive Care give us a call at 516-762-0155 or email us at solutions@glassertech.com.

Wednesday, March 6, 2013

Updates and more updates. Another reason to get managed services from Glasser Tech

Do you notice while you are sitting there trying to concentrate that you are getting pops ups for updates for Windows, Java, Adobe and other programs?  We know it’s annoying and distracting.  Ultimately, it’s just one more thing to worry about.  Do I need this update? does it matter?.  How does it affect me? 

Java

Again this week Java released an update to fix two NEW flaws. Java is a programming language that enhances web pages. They consider these flaws to be putting you at risk for exposure.  

With Glasser Tech ProActive Care you won’t ever have to worry about updates again.  We take care of all the updates automatically.  So while we do our work, you can do your work with no distractions. 

In addition to updates, Glasser Tech takes care of all of your network monitoring.  We can schedule preventative IT maintenance designed to keep your network operating efficiently. Overall, this reduces the number of emergency incidents you encounter.

Managed services costs so little compared to expensive downtime. 

Glasser Tech Proactive Care offers 24/7, 365 day network monitoring coupled with preventative IT maintenance that ensures optimum network uptime.

Call Glasser Tech today and ask for a complimentary network evaluation.   516-762-0155 or email us at Solutions@glassertech.com

Friday, February 15, 2013

Free Law Firm CLE Seminar

Glasser Tech LLC and Thomson Reuters
Free Lunch & Learn Legal Productivity Seminar
_______________________________________________________________________
CLE Seminar Date:
• Thursday March 7, 2013 - 12pm -1:30 pm
_______________________________________________________________________

The program features top productivity solutions offered by Thomson Reuters.

Michael Glasser and Ken Hale from Glasser Tech LLC will be bring insight to being able to work from anywhere at any time.

To Register Click Here
This class gives you 1 NYMCLE Credits.

Location:  Nassau County Bar Association, 15th & West Streets, Mineola, NY 11501

Tuesday, February 5, 2013

February 2012 Java Update


Java Emergency Update
This vulnerability affects: All Java Windows and Mac Versions.
How an attacker exploits it:  Multiple vectors of attack, including luring your users to a malicious web page containing specially crafted Java
Impact: This type of attack could result in: the installation of malware; lead to identity theft; the computer could become a botnet - which can then be used in denial-of-service attacks against other sites.
What to do Part 1Click Here to Download the Patch 7u13 
What to do Part 2: We suggest disabling Java in your Browser unless you absolutely need it. Click Here to Learn How to Disable Java in your Browser
What to do Part 3: If you absolutely need Java enabled in your Web Browser we suggest the following:  Install a Firewall at your office.  Set the Firewall to Block All Java Applets.  Allow Exceptions only for those that are required for your business.  

If you don't have Java, don't install it.   Click Here to see if you have Java enabled

Clients with our Proactive Solution to Patch Management Automatically get the Updates.  

Contact us to find out how you can become "Proactive" instead of "Reactive".

Michael Glasser, Glasser Tech LLC (516) 762-0155

Monday, January 14, 2013

Java Emergency Patch Released...However, we Recommend Disabling Java in your Web Browser


Java Emergency Patch
This vulnerability affects: Java Windows and Mac Versions.
How an attacker exploits it:  The issue could be exploited if someone visits a Web site that's been set up with malicious code to take advantage of the hole.
Impact: This type of attack could result in: the installation of malware; lead to identity theft; the computer could become a botnet - which can then be used in denial-of-service attacks against other sites.
What to do Part 1Click Here to Download the Patch
What to do Part 2: We suggest disabling Java in your Browser unless you absolutely need it. Click Here to Learn How to Disable Java in your Browser
What to do Part 3: If you absolutely need Java enabled in your Web Browser we suggest the following:  Install a Firewall at your office.  Set the Firewall to Block All Java Applets.  Allow Exceptions only for those that are required for your business.  

If you don't have Java, don't install it.   Click Here to see if you have Java enabled

Clients with our Proactive Solution to Patch Management Automatically get the Updates.  

Contact us to find out how you can become "Proactive" instead of "Reactive".

Michael Glasser, Glasser Tech LLC (516) 762-0155

Thursday, January 3, 2013

Microsoft Issues Critical Internet Explorer Fix for Versions 6, 7 & 8


Internet Explorer Fix it Patch· 
This vulnerability affects: Internet Explorer Versions 6, 7, & 8.
How an attacker exploits it:  All the user needs to do is visit the Website and their system gets infected without clicking or doing anything on the site.
Impact: This type of attack installs Malware on your system.
What to doClick Here to Download the Fix


Clients with our Proactive Solution to Patch Management Automatically get the Updates.  

Contact us to find out how you can become "Proactive" instead of "Reactive".

Michael Glasser, Glasser Tech LLC (516) 762-0155