443-992-7394

Windows 7, Windows XP, & Malware Infections: Is your Computer at risk?

According to the latest Microsoft Security Intelligence Report (volume 13), the average number of infected Windows 7 SP1 machines has increased in 2012 by 23% on 32-bit systems and 7% on 64-bit systems, compared to the last quarter of 2011. Meanwhile, the average number of malware-infected Windows XP SP3 PCs has increased by around 10%.

According to the report: “A similar trend of slowly increasing infection rates was observed for Windows Vista between 2007 and 2009, prior to the release of Windows 7.” But why? Well, as more and more people adopt software, security suffers. Early adopters are often well versed in cybersecurity techniques. However, the general populous is not.

“As the Windows 7 install base has grown, new users are likely to possess a lower degree of security awareness than the early adopters and be less aware of safe online practices,” according to the Microsoft security report.

Quick Security Tips from Working Nets

  1. Avoid questionable behavior. If you engage in questionable behaviors; if you don’t have SOME healthy skepticism about clicking on links to who-knows-where; if you download “drivers” or “players” willy-nilly, so that you can see that “new video”, and especially if you don’t have some form of anti-virus software, you’re going to get hurt.
  2. Trying to avoid paying for software by downloading license key generator, also known as Keygen, software to allow you to install a full-version of whatever software you’re talking about is not only illegal, it constitutes “questionable behavior.” Remember what we just talked about. There is plenty of free software, and if the software you want to use isn’t free, and is that important to you, it’s probably worth paying for. It’s usually cheaper than having to have viruses uninstalled, and is certainly cheaper than having financial credentials stolen.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Virus/Spyware Protection Services: Viruses and spyware are time-consuming and costly. The virus protection we offer is top-notch and consistently updated. Our monitoring software ensures your business is safe.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Windows 7 Malware Infection Rates Soar

 

Cybersecurity News: The Current State of the Cybersecurity Act of 2012

The Cybersecurity Act of 2012: “To enhance the security and resiliency of the cyber and communications infrastructure of the United States.”

As you may or may not know, The Cybersecurity Act of 2012, sponsored by Joseph Lieberman (I–CT) and Susan Collins (R–ME), was defeated in the Senate after failing to gain the 60 votes necessary to move the bill past cloture and go up for a full vote. Obviously, the Act is still not ready, at least in the eyes of the Senate. And Senator Al Franken (D-Minn), a strong proponent for national cybersecurity, agrees. But he also acknowledges that something must be done.

“News reports and experts confirm that our nation’s critical infrastructure-such as our water systems, our power grid, and so forth-are vulnerable to attacks from hackers and foreign governments,” said Sen. Franken. “…Our nation needs to respond to those threats.”

Luckily, Franken has a solution. Rather than scrapping the Cybersecurity Act of 2012 all together, Franken believes it can be amended.

“The Cybersecurity Act is not perfect, but when it comes to striking a balance between cybersecurity and privacy and civil liberties, it is the only game in town,” said Sen. Franken. “Unfortunately, it’s hard to write a good cybersecurity bill-because when you try to make it easier for the government or Internet companies to detect and stop the work of hackers or other bad actors, you often end up making it very easy for those same entities to snoop in on the lives of innocent Americans.”

Franken has proposed several amendments that would remove provisions found in Section 701 of the Cybersecurity Act of 2012 that allow Internet Service Providers (ISPs) the authority to monitor and take actions against their users. It is the Senator’s hope that these amendments will alleviate many of the issues that his fellow Senators have with the Act.

“And I hope that my colleagues here in the Senate will join me in passing this amendment,” added Sen. Franken.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Sen. Franken: Improved Cybersecurity Bill Will Better Protect Privacy, Civil Liberties, but Still Needs Work

Franken Amendment Would Remove Worst Part of Cybersecurity Bill

 

Password Changes with Google Apps Outlook Sync Tool

Okay, so today I had a client call with a problem that should have been obvious, but wasn’t. Seems one of her users had reset her Google Apps password, and now the Outlook Sync Tool (GAOST) wasn’t working anymore. Further, there didn’t seem to be any way to reset that password – at least, nothing was prompting for it. Further, I couldn’t find anything on the Internet about how to fix this issue, so here it is:

  1. Close Outlook.
  2. Click: Start | All Programs | Google Apps Sync | Delete Saved Google Apps Password.
  3. Identify the profile you want to change and click Delete Stored Password. Then click OK when it tells you it’s been done.
  4. Close the application. You can click Cancel if you like – it doesn’t matter.
  5. Start Outlook (and make sure you’re using the correct profile, if prompted).
  6. A window should pop up giving you the opportunity to enter the new password. If so, do so, and click the Remember This Password box. If it doesn’t pop up… (and this was our issue today…)
  7. Check to see whether Outlook says “Offline” in the lower right corner. It probably does. Either way, check the File menu, and look for whether there is a check-mark next to “Working Offline”. If there is, click it to turn it off. If you don’t see “Working Offline,” you might need to click the double-down-arrow button which shows the options you haven’t used recently.
  8. Restart Outlook.

That’s it. Hope this helps someone else.

QuickBooks 2012 Can Automate Inv. Numbers in The Subject Line

For those of you who don’t really use QuickBooks that much, this won’t sound that exciting. But for those who do, one feature that’s been requested since the early 2000’s, has been the ability to automatically put the invoice number in the subject line of emailed invoices. So, the outbound invoice can automatically say Invoice #2708 instead of just Invoice.

Well, now you can! The field code is “<NUM>”, so you just put in “Invoice #<NUM>” and it automatically comes up right when you go to email it. Alright, maybe I get a little overly excited about these things, but I’ve been wanting this for a long time! Oh, don’t use the quote marks, in real life.

What is User Account Control (aka UAC)?

The much-maligned UAC is an important Windows security feature that first made its debut in Windows Vista, and has continued into Windows 7 and Windows Server 2008. It’s a really important feature that we should all be embracing. But most people don’t really understand what it does; they find it annoying and largely ignore it. Worse, some folks actually turn it off, which removes a lot of the protections afforded by Vista and 7 over Windows XP.

In brief, UAC is the security feature that makes your screen go dark, and brings up a window asking you to Allow something to do something (i.e. install software) to your computer.

It is interesting that Macs have something very much like it, as do most current versions of Linux. But their users don’t seem to complain about it too much. I think this is due, largely to the way Microsoft chose to go about it, particularly in Vista. Windows 7 has done it a lot better, but I still think we have a way to go.

So what, exactly, is UAC? What does it do? Why do you want it?

In order to understand that, we have to go back a little bit…

Why XP is so vulnerable

There’s a concept in Security referred to as “Least Privilege.” The idea is that you give someone the least access you can, while still allowing them to do their job. It makes sense, if you think about it. You give all of your staff access to the email system and the Internet, but the Accounting Dept. also gets access to the financials, and HR has access to the personnel files. There’s no reason for HR to be rooting around in the accounting system, or for Accounting to be looking at whether Bill was reprimanded for that incident in the Break Room… The Janitorial folks, who come in when everyone else has gone for the day, have access to everyone’s offices, but not the network. That’s Least Privilege: Everyone has what they need, but not more.

Well, most people don’t really need administrative privileges on their local computers either. Certainly not most of the time. It doesn’t take an admin to write a Word document, or work on a spreadsheet. But those Microsoft Updates need to be installed, and there’s that new version of Firefox, and they really wanted to try that new utility everyone’s been talking about… In larger companies, those things are regulated by the central I.T. Dept. and that’s that. But at home or in smaller companies, it’s just easier to let people do those kinds of things on their own. So it’s typical, on Windows XP computers, to just give the local user administrative-privileges on their own computers.

The problem is that now you use that administrative-user account to go to some perfectly legitimate website on a server that’s been infected, and wham – things start popping up all over your machine. Nasty, vile things that you don’t want to see; that you certainly wouldn’t want your kids, or your boss, to see. Then you get a window that tells you that you’ve got 3 bazillion viruses on your machine, and that you’ve been barred from the Internet, but that for a mere $80.00, they’ll unlock their “malware removal tool,” which will immediately fix all the problems, and all will be right in the world again.

And then, you call me…

UAC

Now imagine that you didn’t have to worry about some of those things. Imagine that your computer automatically stopped the bad stuff from infecting your computer. Imagine that, instead, your computer told you that something was trying to install itself, and then asked you if you were sure you wanted it to install. Then you could say something like, “Hey – I wasn’t trying to install anything on my computer. I was just surfing on a website. Why is it trying to install stuff on my machine? That might be malware. I’m going to say No!”

Alright, stop imagining. That’s what Vista and Windows 7 are doing. In keeping with the concept of Least Privilege, your “Normal” account is now secretly a “Limited” account. And for most of your day, that’s fine. When something comes up that requires Admin-level privileges, instead of just telling you that you can’t install it with a Limited account, it asks you if you’d like to temporarily upgrade your privileges, in order to do that particular function.

That gives you the best of all worlds: You’re using Least Privilege at all times, without even knowing it. The bad guys can’t install things surreptitiously on your computer, because they don’t have the permissions required to do it. The only way they can get those permissions is by asking you! Sure, they’ll use Social Engineering techniques to try to trick you into saying Yes, but that’s more difficult. You can say No.

But Microsoft doesn’t explain that part so clearly. Instead, in typical Microsoft-ese, they tell you that “A program needs your permission to continue…” They don’t tell you what, or why. And you get frustrated because you’ve seen it before, like when you were legitimately trying to install Flash Player, and they freaked you out with that pop-up window, (because you thought it meant you had a virus). But it turned out to be okay. Now, you see that window so often that you just Allow everything without even thinking about it. Or maybe you’ve disabled it entirely, to prevent it from ever bothering you again.

Software Companies and UAC

Also frustrating is that many software manufacturers actually recommend that UAC be turned off, in order to get their software to run properly. They do it because their software isn’t really written to the Vista/7 specifications, but they wanted to get their applications to run on those OSes, without having to recode them a whole lot. This is most common with “Vertical Market Applications,” which are applications written for specific industries: Beauty Salon Management software; Medical Office software; Auto Shop software; things like that.

The companies that make these types of software are usually smaller companies, with very limited budgets. They don’t want to rewrite their software if they don’t have to. And they often don’t have to because there’s no push-back from their target markets. They don’t have customers threatening to switch to a competitor because of it. But they should! Essentially, they are saying that they don’t care about their customers’ security. They’d rather put your computers and your data at risk, than rewrite their out-of-date code to conform with new security standards. And since you don’t know better, you don’t complain about it.

Well, now you know better!

What else can I do?

So if you shouldn’t turn off UAC, what do you do when some applications just won’t run properly with it turned on? What do you do when the software vendor’s Support Team tell you that it’s not compatible with their software?

I’d like to say that you tell them that you’re going to switch to another application unless they fix the problem, but that’s not always realistic. I’d also like to say that Microsoft has provided a way to address it, but unfortunately, they haven’t really.

Microsoft did improve the UAC configuration set significantly in Windows 7. In Vista, there were two settings: On and Off. And the On setting was very annoying, giving rise to things like this commercial, from Apple. Windows 7 now has an additional option in between those two poles. Alright, they give you two, but they’re really identical, except for the question of whether the screen goes dark or not. This additional option(s) says that it will
ask you about some things, but not about others. It’s much less intrusive. But even this isn’t good enough, in my opinion.

There’s much talk from users about the possibility of a UAC “Whitelist”, which would allow you to specify certain applications as being automatically Allowed by UAC. I think that would be a great idea! It would enable you to avoid UAC problems for known applications, while still protecting your computer from the things you don’t want installed. Yes, it could lead to some compromises. You could expressly Allow malware to run, defeating the purpose of it. But let’s face it: you just can’t protect everyone from everything. And it would be better than having people turn UAC off on their machines entirely. But for now, that’s not an option. Hopefully, they’ll put something like that in soon.

If you’re a Vista user, there is a Norton tool that’s still officially in “beta,” which apparently does exactly what I was suggesting: It allows you to save a UAC setting for a given application, so if you Allowed it once, it will always allow it. The tool looks like it does a great job, but it doesn’t work for Windows 7 – I tried it.

Otherwise, in those situations, you may just have to turn it off. But you should be asking your software companies why UAC isn’t supported, and when they’ll have a version that works properly available. And you should be aware of the risks.

Adobe Acrobat Vulnerabilities

In the last couple of weeks, Adobe has acknowledged a number of vulnerabilities in their Acrobat products, including a “Zero Day Exploit” (which means exploit code was found “in the wild” before the vulnerability was even known by the Security Community), all involving their use of JavaScript. (See this link for more details.)

What is JavaScript? Well, it’s a scripting language… essentially a relatively light programming language. It’s used in many web sites, and web-based applications.

But Acrobat is supposed to be a “cross-platform” document format, meaning that the same document can be displayed, and printed, in the same way, regardless of what computer you’re using. Windows, Mac, Linux – it doesn’t matter.

So why do we need JavaScript in an Acrobat Document?

Frankly, I’m not really sure that we do. It certainly doesn’t enhance the ability to use the basic functionality for which it was designed: Creating and reading documents.

At this point, Adobe, and other Security professionals are recommending that you just turn it off. Here’s how to do it (at least on Windows systems, but other platforms should be similar):

  1. Open Adobe Acrobat or Acrobat Reader.
  2. Click the Edit menu item.
  3. Click the Preferences menu item.
  4. In the Categories box, along the left side, look for JavaScript, and select it.
  5. Uncheck the Enable Acrobat JavaScript checkbox.
  6. Click OK.

That’s it. You can now close Acrobat, or use it for reading documents. Whatever you want.

The Internet’s a bit like the Wild Wild West. There are great opportunities out there, but it can be a dangerous place. As Michael Conrad’s character used to say after his daily briefings, in the old Hill Street Blues series, “Let’s be careful out there…”