<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microsoft Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/microsoft/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/microsoft/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:10:16 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Microsoft Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/microsoft/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 095 Why Updates are Important</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 07:15:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Watch]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Why Updates are important]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2607</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important. This sounds familiar Waaaay back in the early days of the #WeekendWisdom series, back at number 3, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video. The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important.<span id="more-2607"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2607-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Waaaay back in the early days of the #WeekendWisdom series, back at <a href="https://www.l2cybersecurity.com/weekendwisdom-003-updates/" target="_blank" rel="noopener">number 3</a>, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video.</p>
<p>The events of the last week has brought it back to me that this really is an important topic that we all need to be aware of.</p>
<h3>What happened this last week?</h3>
<p>Apple, earlier this week, released updates to its iPhones and Mac computers and watches that plugged a vulnerability which was being exploited by a surveillance software maker which literally all they had to do if they wanted to take control of somebody&#8217;s iPhone we&#8217;ll say, all they need to do is send a message to that phone and just when the phone receives the message, they now have control of it. The user of the phone did not have to do anything. So that&#8217;s pretty scary.</p>
<p>Also there was the vulnerability that I talked about in <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/" target="_blank" rel="noopener">last week&#8217;s #WeekendWisdom</a>. Microsoft have issued updates for that this week. So again, it&#8217;s really critical that if you have updates waiting on your Windows computer to apply them.</p>
<h3>This is the reason why updates are important</h3>
<p>You see the problem here is that when the likes of Apple or Microsoft issue updates, criminals go and take those updates, they look at them and they find out what exactly has been fixed in Windows or in the iPhones or whatever. Then they can figure out how they can exploit that, that vulnerability that was there that was fixed. If people don&#8217;t do the updates, the criminals can now exploit them, for those people who don&#8217;t, because there are quite a lot of people who don&#8217;t apply updates.</p>
<p>But it&#8217;s really important that you do.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4" length="34691857" type="video/mp4" />

			</item>
		<item>
		<title>WannaCry no more. At least for now.</title>
		<link>https://www.l2cybersecurity.com/wannacry-no-more/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 22 May 2017 16:07:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Worm]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=666</guid>

					<description><![CDATA[<p>I&#8217;m just going to have a short article this week, just to close off the WannaCry story and counter any of the misinformation that was spread by some supposed &#8220;experts&#8221;. WannaCry is still circulating and affecting machines, but thanks to the kill switch discovered by @MalwareTechBlog, it is more or less neutralised now. Those machines still&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry no more. At least for now.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-thumbnail wp-image-667 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-1-150x150.jpg" alt="WannaCry no more" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />I&#8217;m just going to have a short article this week, just to close off the WannaCry story and counter any of the misinformation that was spread by some supposed &#8220;experts&#8221;.</p>
<p>WannaCry is still circulating and affecting machines, but thanks to the kill switch discovered by <a href="https://twitter.com/MalwareTechBlog">@MalwareTechBlog</a>, it is more or less neutralised now. Those machines still being affected must not be able to &#8220;see&#8221; the kill switch domain.</p>
<p><span id="more-666"></span>Here&#8217;s an interesting tidbit &#8211; Windows XP was <strong>NOT</strong> badly affected by WannaCry. There is a bug in it that meant it could not worm its way out of a WinXP box. Windows 7 was the biggest spreader of it, at 98% of the machines impacted, according to this graphic from <a href="https://twitter.com/craiu/status/865562842149392384">Kaspersky</a>:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-668 size-large" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Wannacry-infections-1024x596.jpg" alt="" width="1024" height="596" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Wannacry-infections-1024x596.jpg 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Wannacry-infections-300x175.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Wannacry-infections-768x447.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Wannacry-infections.jpg 1614w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>So all of the furore about limited budgets causing legacy applications to be kept going, long beyond the Operating System support end-dates was something of a red herring. <img decoding="async" src="https://www.facebook.com/images/emoji.php/v8/fe5/1/28/1f60f.png" alt="?" /></p>
<p>There were also rumours hyped by Heimdal Security last week about a kill switch free version of WannaCry (which was called Uiwix) that was going to be the end of times for the internet. It seems that they slightly over egged that pudding as only a <a href="https://www.theregister.co.uk/2017/05/17/uiwix_ransomware_damp_squib/">single trace</a> of it was found.</p>
<p>Despite what experts in large security firms might still be saying, WannaCry did not spread through e-mail as an attachment or a link. They were probably confused by the fact that just the day before WannaCry hit, a new Ransomware variant called Jaff <a href="https://phishme.com/shadow-wannacry-jaff-ransomware-arrives-using-familiar-phishing-techniques/">came out</a>, which did use e-mail as a vector. WannaCry was a worm and it did all the infecting all by itself.</p>
<p>Finally, the evil doers haven&#8217;t made much in the way of Ransom money. It seems that so far they&#8217;ve only made a little over $90,000.</p>
<p>Here a short video from myself with some tips on how you can protect yourself from Ransomware. Enjoy.</p>
<p><iframe title="Ransomware Tips" width="500" height="281" src="https://www.youtube.com/embed/AFa7wjlwoeg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Of course these tips are included in our <a href="http://www.l2cybersecurity.com/the-ten-commandments/">Ten Commandments</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry no more. At least for now.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Do you WannaCry? I didn&#8217;t think so.</title>
		<link>https://www.l2cybersecurity.com/wannacry-didnt-think-so/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 18 May 2017 12:30:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=660</guid>

					<description><![CDATA[<p>I delayed this week&#8217;s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I&#8217;ll start with some easy background on Ransomware and them explain what was special&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-didnt-think-so/">Do you WannaCry? I didn&#8217;t think so.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-thumbnail wp-image-661 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry-150x150.png" alt="Do you WannaCry?" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I delayed this week&#8217;s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I&#8217;ll start with some easy background on Ransomware and them explain what was special with WannaCry. Then we&#8217;ll get to protecting you.</p>
<p>This story is going to disappear from the news headlines fairly quickly, as there is nothing massively new or worrying coming out for the moment, so we&#8217;ll probably be back to normal by next week.</p>
<h2><span id="more-660"></span>What is Ransomware?</h2>
<p>Ransomware has been around for a good few years. Earlier versions were fairly rudimentary, as they only prevented the victim from using their PC and were easily mitigated. The term itself comes from the techie habit to combining words and in this case it is a combination of Ransom Software.</p>
<p>It normally spreads by e-mail attachment/link or a poisoned web page/online ad. If you open the attachment or click on a poisoned ad, a little piece of computer code executes, which downloads the actual  ransom software from the internet. This software then generates an extremely complicated &#8220;key&#8221;, which is used to scramble the data contained in your files (documents, spreadsheets, photos, videos, databases, etc.). It will carry out the scrambling on any drive that the PC running it can see (so hard drives, network drives, external drives, USB sticks, cloud drives, etc.).</p>
<p>A screen is popped up advising the victim about what has happened and provides instructions for how they can pay the ransom in order to get the &#8220;key&#8221; to unlock and recover their scrambled files. In some cases the &#8220;key&#8221; is stored on the evil doers servers, so if the victim does pay, they will be given the key and will be able to get their files back. There may even be a helpdesk telephone number which you can call to get assistance on how you can pay. This is usually because not everyone knows how to go through the cumbersome process of acquiring BitCoin &#8230; &#8220;Ah here! WTF is BitCoin?&#8221; I hear you cry! ? Basically BitCoin is a virtual currency, which is untraceable and that&#8217;s why the bad guys like it.</p>
<p>If the victim does get their files back, there is a good chance that the crooks will leave behind a &#8220;present&#8221;, which will wait a few weeks, then execute on it&#8217;s own and scramble the files again. The victim paid once, so there is a good chance they will do it again. However there is also a high probability that paying the ransom won&#8217;t mean you get your data back, as you might never get the key from the bad guys.</p>
<p>So that&#8217;s a very brief outline of what Ransomware is. In the last 2 years, it has become extremely prevalent. Over 50% of evil email contains some form of Ransomware.</p>
<h2>What was special about WannaCry?</h2>
<p><img loading="lazy" decoding="async" class="wp-image-662 size-medium alignright" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-300x225.jpg" alt="" width="300" height="225" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-300x225.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-768x577.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt.jpg 900w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>What made WannaCry special was the fact that it spread all by itself. It did not require anybody to click on a link or open an attachment. This is what technical types call a &#8220;worm&#8221;. What it does is it finds a machine on the internet that has a specific vulnerability which it exploits and loads itself into that machine, scrambles the data and then looks for more machines to infect on the local network, as well as on the internet.</p>
<p>My most avid readers ? will remember back in a March <a href="http://www.l2cybersecurity.com/patch-tuesday-double/">post</a>, I discussed the Microsoft Patch Tuesday was a double month, because there had been none in February. Then in an April <a href="http://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">post</a>, we found out why there was secrecy around the previous month&#8217;s patching. The US&#8217; National Security Agency (NSA) had their hacking toolkit released to the internet and Microsoft had spent February urgently patching vulnerabilities that the NSA toolkit exploited.</p>
<p>Which brings us neatly to WannaCry. The evil doers used one of the NSA tools to have their ransomware scan for machines that are vulnerable to a specific exploit and then infect any such machines it finds. Microsoft has issued the patch for this vulnerability in <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">March</a> however it was only issued for the versions of Windows that they still support (Windows Vista, 7, 8.1 and 10 as well as a bunch of server operating systems). Anybody running a Windows XP or 8.0 machine would be vulnerable. The British NHS still has a lot of Windows XP machines and these were the ones that got all of the attention when thousands of them became infected causing surgeries, diagnostic procedures and clinics to be cancelled as a result. In fairness to Microsoft they did subsequently release the patch for the unsupported versions of Windows, which will prevent this attack vector being used in future.</p>
<p>It started circulating on Friday 12th May, and by Saturday it was very widespread, so much so that it grabbed a lot of media attention. This is where it get my first problem &#8211; advice from newspaper &#8220;Tech&#8221; journalists. I&#8217;ll possibly get stick for this, but most of them are nothing more than <em>shiny gadget reviewers</em>. They don&#8217;t actually truly understand the underlying technology and just parrot &#8220;don&#8217;t click links&#8221;, &#8220;patch your software&#8221;, etc. While that is good advice, I then see them giving inaccurate reportage like &#8220;this was spread by somebody clicking on a link&#8221;. No it wasn&#8217;t! That&#8217;s not how a worm works!!! ? &#8230; On a related matter, which I think is hilarious &#8230; the shiny gadget reviewer on Ireland AM on TV3 gave better advice than any &#8220;Tech&#8221; journalist I&#8217;ve read this week. ?</p>
<p>My second problem was advice from &#8220;Experts&#8221; from larger cyber security firms. In the last few days I&#8217;ve heard two such experts (from different unnamed companies) say the same thing as the &#8220;Tech&#8221; journalists, except they made it worse by saying &#8220;this worm was spread by somebody opening an attachment.&#8221; THAT IS NOT HOW A WORM WORKS FFS!!! ?</p>
<p>My third problem is with technology vendors that try to capitalise on the fear, uncertainty and doubt (FUD) that was present in businesses across the globe on Monday morning. Coming out with nonsense like, &#8220;Our Whizz-Bang product will fully protect you from WannaCry.&#8221; as Mrs. Brown is known to say &#8220;That&#8217;s nice.&#8221; See below for some simple steps on how you can protect yourself, that is available for free and for nothing.</p>
<p>There are a lot of small to medium-sized, independent security consultancy firms out there that have been giving excellent, accurate and timely advice. These are the ones you should be listening too. They are staffed by people who actually truly know what is happening. I&#8217;d like to think I&#8217;m also in that category as I don&#8217;t state something unless I know it to be a fact. If I don&#8217;t know something, I will say so and will go and educate myself.</p>
<p>The spread of WannaCry was stanched by a Cyber Security blogger in the UK (<a href="https://twitter.com/MalwareTechBlog">@MalwareTechBlog</a>) who discovered that if a certain internet domain name was registered and active, the worm would not carry out it&#8217;s scrambling and scanning function. This was a great help to the world, which has led the young man to be hounded by tabloid newspapers. There you go &#8211; no good deed goes unpunished. ?</p>
<p>There is one aspect about this, that I&#8217;ve only seen mentioned once. What if the culprits behind this didn&#8217;t use Ransomware as the payload? They used the NSA tools to scan the internet for the vulnerability that allowed them execute something on hundreds of thousands of PCs. They chose Ransomware, which kinda gets in your face when it has done it&#8217;s dirty deed. What if they chose keyloggers (software that logs all key presses &#8211; used for stealing passwords) or other surreptitious, stealthy, spying software? We might never have realised there was something afoot. ?</p>
<p>There&#8217;s talk that it was the North Korean&#8217;s what did it! Is that interesting? &#8230; Maybe. I would have thought they might have preferred the stealth route, but their leader might have had other ideas.</p>
<h2>How do I protect myself?</h2>
<p>This is the insanely easy bit, believe it or not. All you have to do is follow 4 of my 10 commandments:</p>
<ul>
<li><a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> Keep all software up-to-date with automatic patching/updating</li>
<li><a href="http://www.l2cybersecurity.com/use-anti-virus/">Commandment 2</a> Use and keep up-to-date Anti-Virus software</li>
<li><a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">Commandment 4</a> Take regular backups of all your data and test that you can restore.</li>
<li><a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> Ignore email from strangers and be careful of email from friends, family, co-workers.</li>
</ul>
<p>Do those few things and you shouldn&#8217;t have to pay any ransom to anybody, because if 1, 2 and 5 fail you (for whatever reason), then 4 will recover you. ?</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-didnt-think-so/">Do you WannaCry? I didn&#8217;t think so.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers released NSA hacking tools &#8230; World continues to turn ?.</title>
		<link>https://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 15:32:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Hacking Tools]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=624</guid>

					<description><![CDATA[<p>You probably missed it &#8211; but don&#8217;t worry, I&#8217;m here to give you the simple low-down ?. The Cyber Security world was in meltdown for some of last weekend about the fact that a hacking group known as Shadow Brokers had released a load of NSA hacking tools to the internet and this meant everyone was&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">Hackers released NSA hacking tools &#8230; World continues to turn ?.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-625 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/04/shadow-brokers-nsa-hacking.png" alt="NSA Hacking tools" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/04/shadow-brokers-nsa-hacking.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/04/shadow-brokers-nsa-hacking-150x150.png 150w" sizes="auto, (max-width: 300px) 100vw, 300px" />You probably missed it &#8211; but don&#8217;t worry, I&#8217;m here to give you the simple low-down ?. The Cyber Security world was in <a href="https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/">meltdown</a> for some of last weekend about the fact that a hacking group known as Shadow Brokers had released a load of NSA hacking tools to the internet and this meant everyone was at risk from hackers breaking into their files and the sky was going to fall and leopards would lie down with the goat, etc. etc.  All pretty apocalyptic stuff ? (though, if you are a Windows XP/Server 2003 user it probably is the end times. ?)<span id="more-624"></span></p>
<p>Well for the most part<span style="color: #ff0000;"><strong>§</strong></span> it turned into &#8220;not much to see here, move along&#8221;. Yes, these NSA hacking tools were released to the internet for anybody with evil intentions to use them on the innocent. Yes, they are highly effective. Yes, they can let hackers break into your computer.</p>
<p>But you follow my <a href="http://www.l2cybersecurity.com/use-automatic-updates/">first commandment</a> don&#8217;t you? You keep your Windows (and other software) automatically updated, don&#8217;t you? If so, then you&#8217;ll be fine &#8230; nothing to see here, move along &#8230; these NSA hacking tools are nothing to concern yourself with.</p>
<p><span style="color: #ff0000;"><strong>§</strong></span>Now, this is where the earlier reference to &#8220;for the most part&#8221; gets some clarity. If you are running Windows XP, then you are at extreme risk of probably every tool that was released by Shadow Brokers. Microsoft patched the vulnerabilities in their supported operating systems (so Windows 7, 8.1 and 10) that all of the hacking tools exploited, except for three. The tools that were named &#8220;EnglishmanDentist”, “EsteemAudit”, and “ExplodingCan” are the only ones that Microsoft didn&#8217;t bother with as they only affected earlier versions of Windows which Microsoft no longer support (Windows XP or Server 2003 anyone?).</p>
<p>So if you are still an XP/2003 user, you&#8217;ve got a pile of evil-doers, with access to at least 12 hacking tools which the NSA created and they can come and compromise your PC/Laptop/Server! ? It&#8217;s that simple, you really need to move off XP/2003 for your own good. If you can&#8217;t upgrade, then get the XP/2003 thing off the internet so you can&#8217;t be compromised. ?</p>
<p>Some of you may recall back in <a href="http://www.l2cybersecurity.com/patch-tuesday-double/">March</a>, I talked about how Microsoft offered no patches in February and then here was a double lot in March. Microsoft were pretty tight lipped about why this happened and most of the speculation was around problems encountered with the way they were changing their method of delivering updates.</p>
<p>Welllllll &#8230; it would seem it was much more likely that is was to do with the NSA giving them a low-down on the vulnerabilities that they knew were about to be revealed and exploited by the bad guys and so Microsoft put the head down and got on with fixing these &#8220;secret&#8221; vulnerabilities. ?</p>
<p>There were also <a href="https://www.theregister.co.uk/2017/04/14/latest_shadow_brokers_data_dump/">some tools</a> released which enabled the NSA (the US National Security Agency) to monitor some service bureaus used by the SWIFT inter-bank payment network. This mainly targeted middle-east bureaus, but it&#8217;s possible this could be expanded. This is something for the SWIFT network to address and there is likely nothing you can do about this. ?</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">Hackers released NSA hacking tools &#8230; World continues to turn ?.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Really &#8211; Don&#8217;t open that Word attachment! It is malware.</title>
		<link>https://www.l2cybersecurity.com/really-dont-open-word-attachment-malware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 10 Apr 2017 10:30:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Attachment]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Word Document]]></category>
		<category><![CDATA[Word Malware]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=619</guid>

					<description><![CDATA[<p>It was reported over last weekend that there was a Microsoft Word vulnerability that allowed a type of Word malware (malicious software) to infect a persons PC/Laptop simply by opening the document. Even having macros disabled would not protect the victim. So what happens? You get an e-mail from somebody with a Word document attachment&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/really-dont-open-word-attachment-malware/">Really &#8211; Don&#8217;t open that Word attachment! It is malware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-620 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/04/word_2013-infected-300x300.jpg" alt="Word malware" width="143" height="143" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/04/word_2013-infected-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/04/word_2013-infected-300x300-150x150.jpg 150w" sizes="auto, (max-width: 143px) 100vw, 143px" />It was <a href="https://www.theregister.co.uk/2017/04/09/microsoft_word_ole_bug/">reported</a> over last weekend that there was a Microsoft Word vulnerability that allowed a type of Word malware (malicious software) to infect a persons PC/Laptop simply by opening the document. Even having macros disabled would not protect the victim.</p>
<p>So what happens?<span id="more-619"></span></p>
<p>You get an e-mail from somebody with a Word document attachment (specifically a rich text format or RTF type document, but it has a .DOC file extension). If you open this file, there is something embedded in the it which causes Word to send a request to a remote server, which downloads some nasty program code to your machine. It then pops up a fake document for you to see, so you think nothing suspicious is going on. Meanwhile in the background the malware continues doing whatever evil work it&#8217;s creators have decided it should do to you. Quite likely it will execute Ransomware which will scramble all your files and charge you money to get them back.</p>
<p>If you didn&#8217;t follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> and opened the document (just out of curiosity of course ?), then I pray you at least adhered to <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">Commandment 4</a> and had a good backup of your data which you can recover from.</p>
<p>This vulnerability affects all versions of Word up to and including Word 2016 running on all versions of Windows up to and include Windows 10.</p>
<p>So, it&#8217;s really quite simple. Please follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> and do not open attachments or click on links in e-mails from strangers. Also be very wary of e-mails from friends, family or co-workers that are, even slightly, out of the ordinary. Pick up the phone and ask them if they did send you that e-mail.</p>
<p><a href="https://www.fireeye.com/blog/threat-research/2017/04/acknowledgement_ofa.html">FireEye</a>, a security company, had been working with Microsoft on this vulnerability, which may or may not be patched in tomorrow&#8217;s <em>Patch Tuesday</em>. However <a href="https://securingtomorrow.mcafee.com/mcafee-labs/critical-office-zero-day-attacks-detected-wild/">McAfee</a> made the vulnerability public last Friday and so the cat is out of the bag. Some might say that it was reckless of McAfee to do this, but they noted that attacks have been occurring since January and if Microsoft were not to patch this bug tomorrow, then that could mean another month without a solution. So I&#8217;m inclined to leave them off with this on that basis.</p>
<p>So at the end of the day, have a read through my <a href="http://www.l2cybersecurity.com/the-ten-commandments/">Ten Commandments</a> of Cyber Security. If you follow even half of them, you will be a much more secure than following one or none of them.</p>
<p>The post <a href="https://www.l2cybersecurity.com/really-dont-open-word-attachment-malware/">Really &#8211; Don&#8217;t open that Word attachment! It is malware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patch Tuesday on the double.</title>
		<link>https://www.l2cybersecurity.com/patch-tuesday-double/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 14 Mar 2017 15:07:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=593</guid>

					<description><![CDATA[<p>So where were you when the great big double-barrelled Patch Tuesday of March 2017 rolled around? Me? I was in my office and carrying on about my business as I always do, whether it&#8217;s Patch Tuesday or not. The fact that it is a regular occurrence, means that it has become a mundane and expected&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/patch-tuesday-double/">Patch Tuesday on the double.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class=" wp-image-594 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/pitr-Patch-icon-2-300x300.png" alt="Double Patch Tuesday" width="200" height="200" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/pitr-Patch-icon-2-300x300.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/pitr-Patch-icon-2-300x300-150x150.png 150w" sizes="auto, (max-width: 200px) 100vw, 200px" />So where were you when the great big double-barrelled Patch Tuesday of March 2017 rolled around?</p>
<p>Me? I was in my office and carrying on about my business as I always do, whether it&#8217;s Patch Tuesday or not. The fact that it is a regular occurrence, means that it has become a mundane and expected part of our daily digital existence. For this reason, and this reason alone, is why last month&#8217;s absence of a Patch Tuesday is of great concern to security professionals like myself.<span id="more-593"></span>&#8220;I got updates on Windows last month!&#8221; I hear you cry. So did I, but it was only for that disgrace of a piece of software that is <a href="http://www.l2cybersecurity.com/adobe-flash-player-terrible/">Adobe Flash Player</a>.</p>
<p>What we were missing were a number of patches for Microsoft&#8217;s various software that we have installed on our desktops, laptops and servers. This was the first time in 14 years that they skipped a month and they did so without providing us with any indication of what the problem was.</p>
<p>So in March 2017 Microsoft fixed 135 vulnerabilities across their software estate, which is pretty freakin&#8217; big. The number of vulnerabilities though is only a small part of the serious problem that us concerned security folk have with Microsoft. One of the critical vulnerabilities that was patched on the <span style="text-decoration: underline;"><strong>14th of March</strong></span> was a flaw that was <span style="text-decoration: underline;"><strong>publicly</strong></span> disclosed on the <span style="text-decoration: underline;"><strong>2nd of February</strong></span>. This meant that the evil doers would have been attempting to exploit the vulnerability for nearly 6 weeks &#8230; which is an aeon in a hacker&#8217;s world.</p>
<p>Now, we can&#8217;t take umbrage at the fact that Carnegie Mellon University revealed the existence of the vulnerability in February, which had been discovered last year. Microsoft were notified about it and so an expectation that they were going to fix it in February 2017 was reasonable. However, something went awry with the whole month-worth of patches and so a lot of people were exposed for a very long period of time, which is really inexcusable.</p>
<p>I preach to people, telling them they need to keep their software and devices up-to-date. Then M$FT go ahead and make a mockery of the arrangement.</p>
<p>The post <a href="https://www.l2cybersecurity.com/patch-tuesday-double/">Patch Tuesday on the double.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
