Microsoft: Beware of Third-Party WMF Patch

Found on eWEEK on Monday, 02 January 2006
Browse Software

Microsoft Corp. has slapped a 'buyer beware' tag on a third-party patch for the zero-day Windows Metafile flaw and promised that its own properly tested update will almost certainly ship Jan. 10.

The company's latest guidance comes days after an unofficial hotfix from reverse-engineering guru Ilfak Guilfanov got rare blessings from experts at the SANS ISC (Internet Storm Center) and anti-virus vendor F-Secure Corp.

In a blog entry, Johansson said enterprise IT administrators must carefully consider the risks involved before thinking of applying Guilfanov's hotfix. "The patch is an executable and has to be run on each vulnerable system, meaning cost of implementation is potentially very high."

If security experts from SANS and F-Secure think the unofficial patch is safe, then it probably is. Of course MS cannot recommend to install it, but if it protects you until the official fix is out, there shouldn't be anything wrong with doing so.

Windows zero day nightmare exploited

Found on The Inquirer on Wednesday, 28 December 2005
Browse Software

F-Secure, Bugtraq and a number of other security aware outfits have warned of a zero day vulnerability that's being actively exploited as we write.

Fully patched Windows XP SP2 machines are vulnerable and there's no known fix as yet.

A number of trojans are being distributed using the vulnerability, related to Windows' image rendering.

F-Secure says you can get blatted if you visit a site with an image file containing the exploit. IE users may automatically be infected. Firefox users can get infected if the image file is downloaded.

There is no solid workaround against emerging WMF exploits. Locking down WMF files on the gateway and building network detection signatures may mitigate known threats. The impact of attacks may also increase.

You can find more details at F-Secure as well as a temporary solution. This workaround unregisters the "Windows Picture and Fax Viewer", an application I've never used (at least not knowingly), so I might as well leave it unregistered.

Virus poses as MSN Messenger 8

Found on The Register on Tuesday, 27 December 2005
Browse Software

Malware authors have produced a virus which poses as a test version the latest, as yet unreleased, version of MSN Messenger. The Virkel-F masquerades as "MSN Messenger 8 Working BETA" and is available from a bogus site as a supposedly leaked early version of the software.

Windows users who download and run the malware (given the name BETA8WEBINSTALL.EXE by hackers) will fail to get the promised chat client. Instead their existing MSN Messenger client will start to send download links to everyone in their contact lists in a bid to encourage others to become infected. Infected machines will also become clients in a botnet network of compromised PCs.

The social engineering trick uses interest in test version of Windows Live Messenger 8 - access to which is being auctioned on eBay - to hook victims.

I always wonder why some people run to get the latest betas. I'm still using an old version of ICQ which runs stable and isn't bloated like the new ones. And I can chat fine with it. MSN runs via Miranda, which is way faster than any IM client I've seen so far.

Symantec refuses to sell audit tool outside US

Found on The Register on Thursday, 22 December 2005
Browse Software

Symantec has stopped selling a password auditing tool to customers outside the US and Canada, citing US Government export regulations.

Symantec's restrictions recall the dark days of the crypto wars when users outside the US were not entitled to buy products featuring strong ciphers. These rules, relaxed by the Clinton administration and following a long running campaign by cryptography experts and net activists, are once again rearing their head.

Beyond confirming that "the statement you have received from your reader is correct", Symantec declined to field questions on the rationale for its policy and whether it applies to other products. Any US government policy to impose export regulations on security technologies would be futile since, to cite only one reason, many security firms are based outside the US and therefore unaffected by such regulations.

Let's just file this under "attempts to fight terrorism". That's probably the first explanation officials would give. Of course this will stop bad guys from using this password tool, because they cannot obtain it legally; and everybody knows that nobody would be so desperate to download it from one of the various filesharing networks. Welcome to the global network.

Software Predicts Movie Success

Found on Technewsworld on Friday, 16 December 2005
Browse Software

A computerized analysis of 800 films demonstrated a significant level of accuracy in gauging their financial success. The software predicted the right revenue category for the film 37 percent of the time. Seventy-five percent of the time, the film ranked within one category of its actual performance.

Professor Ramesh Sharda, an information systems specialist at Oklahoma State University, has developed a computer program to help Hollywood predict the potential success -- or failure -- of a film.

Sharda selected seven criteria on which to predict a movie's potential viability in the marketplace. Those include its rating by censors (e.g. G, PG, R), strength of the cast, genre, competition from other films at the time of release, special effects, whether it is a sequel, and the number of theaters in which it will show.

Oh joy. I wonder how long it will take until the software also produces blockbuster scripts. Or they could hook it up to Pixar and let it render the movies. Expect more mainstream entertainment.

Xbox 360 copy protection cracks

Found on BBC on Wednesday, 14 December 2005
Browse Software

Hackers have taken the first step towards breaking the anti-piracy system on Microsoft's Xbox 360 game console.

Information about the work of Team PI Coder was posted to a Dutch piracy site along with the raw data from the games. There was also links to a small program the group produced that helps to extract the data.

The crackers have not managed to get the data off game disks, instead they have dug out the version of the game that the Xbox 360 creates when gamers start playing.

The crackers said they were releasing the raw data to help other hacking groups start the task of working out how the Xbox 360 tries to stop piracy.

"So the first task is done," wrote Team PI in the information files. "We hope this encourages all hackers, coders and crackers out there to take up the challenge."

Seems like it won't take long until the first working game releases will appear.

Warner Music attacks specialized web-browser

Found on Boing Boing on Tuesday, 06 December 2005
Browse Software

PearLyrics is a program that displays the lyrics of the currently-playing track in iTunes: it gets the lyrics from the ID3 tag in the MP3 file, or if they aren't in there, it searches for them on a few different web sites, and then saves them into the MP3s.

It's very handy: I managed to use it to download the lyrics for almost half of my music collection in one fell swoop.

Except that the author got a "Cease and Desist" letter from Warner/Chappel Music, who seem to think that his program -- which is, basically, nothing more than a specialized web browser -- is somehow in violation of their copyrights.

Now if the entertainment industry just knew where to send it to, the Internet would already have received a "Cease and Desist" letter.

Hacker gets blessing to hole democracy

Found on The Inquirer on Thursday, 24 November 2005
Browse Software

A finnish computer hacker is going to break into the Diebold Election System with the blessing of California's secretary of state.

Secretary of State Bruce McPherson has already refused Diebold certification after 20 percent of the new, voting machines malfunctioned during a July test, however now he wants to make sure that the machines are secure.

Last May, Hursti tested a Diebold system and changed the voting results. He also inserted a new program that flashed the message "Are we having fun yet?" on the computer screens.

He confirmed that if someone has the same access as an employee of the election office it was possible to enter the computer, alter election results and exit the system without any physical record. Now McPherson wants to see this test for himself.

Hursti will use a randomly selected voting machine from one of the 17 counties that use a Diebold system. Diebold wanted it to use a machine that it provided, however that idea was vetoed by the state, we assume because it didn't want a machine designed to cheat the test.

It's amazing that Diebold is still in business. When dealing with something important as votes, they should be required to make their systems as secure as possible. But when you remember that the CEO backs Dubya and said the he was "committed to helping Ohio deliver its electoral votes to the president ", then you don't have to wonder that much anymore.

RIAA backs rootkits

Found on The Inquirer on Sunday, 20 November 2005
Browse Software

RIAA president Cary Sherman has backed Sony's use of spyware rootkits and claims that other companies do it all the time.

Sherman said that music corporations have the same right to protection as movie studios, video game makers, or software companies.

He said that there was nothing unusual about technology being used to protect intellectual property. He said that you can't make an extra copy of Windows or virtually any other software. Why should CDs be any different?

I'm not sure if I should laugh about this, or just pat him on the head. I'm not going to mention that virtually every software is available as a copy somewhere. You can't even say that those are just a handful of copies, when even MS changed it's policy and made SP2 available to legal and illegal users for the sake of security. Even if (repeat: if) his statement would be true: this doesn't give anybody the right to infect a computer and modify it to a degree so that the software cannot be seen or uninstalled. Not to mention the security holes and (Sony's) violation of copyrights.

Would You Use Ad-Supported Windows?

Found on Slashdot on Thursday, 17 November 2005
Browse Software

ZDNet reported earlier this week that Microsoft was thinking of offering an Ad-Supported version of Windows. A blog post by John Carroll offers some reasons why Ad-Supported Windows makes sense. From the article: '4. More revenue through targeted marketing: The holy grail of marketing is to target an audience with the sort of ads that most appeal to them. Sending a bunch of male programmers advertisements for breast enlargement isn't terribly useful. Sending a bunch of male programmers advertisements for a four hour extended version of Star Trek: The Wrath of Khan is useful.' Is there any situation where you can see yourself open to the possibility of using an Ad-Supported operating system?

Not as long as someone comes up with a "fix" for that. You get already spammed by email, instant messaging, telemarketers, snail mail, TV and more... why not add Windows?