Categories
Uncategorized

Advisory for ZoneAlarm customers with Microsoft Update KB951748 (MS08-037)

After the release of MS08-037, Microsoft became aware of reports of ZoneAlarm customers experiencing issues after applying the security updates. According to Christopher on the post on the MSRC blog

"We started investigating these reports as soon as we heard about them and have been working to research this issue. We’re still working on this issue but we do have some information from our investigation so far, which we’ve put into the bulletin.

"Specifically, we’ve identified that customers who are running either ZoneAlarm or Check Point Endpoint Security (previously named Check Point Integrity) who apply MS08-037 may lose network connectivity after applying these updates. Our investigation so far has shown that no other customers are affected by this issue.

"We’re still investigating this issue but we encourage customers who are using ZoneAlarm to review the appropriate ZoneAlarm Web site and Check Point Endpoint customers to review the appropriate Check Point Web site for the latest guidance or software updates and factor this information into your risk assessment, testing, and deployment planning."

See also CheckPoint’s ZoneAlarm’s tech note and press release, as KB951748 impacts ZoneAlarm users on Windows XP/2000…

Platforms Affected: ZoneAlarm Free, ZoneAlarm Pro, ZoneAlarm AntiVirus, ZoneAlarm Anti-Spyware, and ZoneAlarm Security Suite

Download and install the latest versions which solve the loss of internet access problem here (English only):

  • ZoneAlarm Internet Security Suite
  • ZoneAlarm Pro
  • ZoneAlarm Antivirus
  • ZoneAlarm Anti-Spyware
  • ZoneAlarm Basic Firewall
  • See more news on the issue here.

    Tags: Microsoft, security, ZoneAlarm, MS08-037.

    Categories
    Uncategorized

    Microsoft spills the beans on COFEE at law-enforcement conference

    As covered by Seattle Times technology reporter Benjamin J. Romano in his coverage of Law Enforcement Technology 2008 conference Monday at Microsoft, Brad Smith outlined the COFEE, a small USB key fob that can be used by crime investigators. (Holy CSI, Batman.)

    Microsoft COFEE“The COFEE, which stands for Computer Online Forensic Evidence Extractor, is a USB “thumb drive” that was quietly distributed to a handful of law-enforcement agencies last June. Microsoft General Counsel Brad Smith described its use to the 350 law-enforcement experts attending a company conference Monday.

    “The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer’s Internet activity, as well as data stored in the computer.”

    A look at the device is available on King 5’s news video on demand site, link above.

    Also of interest on PressPass, a brief interview with Tim Cranton, Associate General Counsel for Microsoft.  He “discusses the role of the Internet Safety Enforcement Team as part of Microsoft’s larger security strategy and calls on global public-private partnerships to help prevent online crime at the Law Enforcement Technology 2008 conference.”

    Also see this transcript of Brad Smith’s speech at the Conference.

    Categories
    Uncategorized

    Microsoft vs. Apple: Who patches zero-day vulnerabilities faster? The Swiss chime in with an answer

    So, the controversy is nothing new, and nearly as old as the as Apple 1984 commercial.  I’ve posted previously at Mac and PC Security and noted that — no matter what connected platform you use — there’s no immunity from security vulnerabilities.  And there is certainly no shortage of news on Macintosh vs. Windows vulnerabilities.

    This week it appears that the efforts to improve security over the last few years had paid a dividend: Computerworld notes the Swiss research that examines which company patches zero-day vulnerabilities faster.  And the answer isn’t likely to show up in an Apple ad any time soon…

    Apple’s teasing commercials that imply its software is safer than Microsoft’s may not quite match the facts, according to new research revealed at the Black Hat conference on Thursday.

    Researchers from the Swiss Federal Institute of Technology looked at how many times over the past six years the two vendors were able to have a patch available on the day a vulnerability became publicly known, which they call the 0day (zero-day) patch rate.

    They analyzed 658 vulnerabilities affecting Microsoft products and 738 affecting Apple. They looked at only high- and medium-risk bugs, according to the classification used by the National Vulnerability Database, said Stefan Frei, one of the researchers involved in the study. [Click here for the paper in PDF format.]

    What they found is that, contrary to popular belief that Apple makes more secure products, Apple lags behind in patching.

    Frei is with the Computer Engineering and Networks Laboratory (TIK) at the Swiss Federal Institute of Technology, ETH Zurich. The paper is “0-Day Patch – Exposing Vendors (In)security Performance, 2008” in which the researchers look at the “0-day patch rate as a new metric to measure and compare the performance of the vulnerability handling and patch development processes of major software vendors.”

    I hear the Swiss are traditionally neutral. 😉

    More at http://www.techzoom.net/risk/ and the Computerworld article at Microsoft vs. Apple: Who patches zero-days faster?

    Tags: Microsoft, security, Macintosh, Stefan Frei, 0 Day, vulnerability.

    Categories
    Uncategorized

    PC Magazine: Phony e-card site serves up malware

    A quick note before lunch…  per PCMAG today… there are a number of phony electronic cards being circulated this Valentine’s day…

    Sunbelt Software is reporting a virulent and convincing fake greeting card site and associated malware.

    Like most malware these days, it is delivered through a rogue web site. The link to the site is in an e-mail spammed out to victims as a greeting card. When you click the link you are told you need to update your Flash player to view the card.

    See American Greetings Phony Site Serves Malware With A Smile – Security Watch for more details, and don’t open suspicious emails from someone you don’t know.  Also see Pleasure, pain for investors on love’s day (Chicago Tribune).

    Categories
    Uncategorized

    Cybercrime: Mercury News on Ghosts in the Browser: Protecting yourself online

    It’s a busy time if year for shopping, traveling, spoofing and hacking. Do you know where your credit card number is right now?  And I trust that your ATM card is safely tucked away (PIN secure) and hasn’t been duplicated by an unsavory individual intent on depleting your bank account via a corner store ATM in a far off land.

    Check out Ryan Blitstein’s special report in the Mercury News on how thieves are using computers and the Internet to commit cybercrimes.

    Part I: How online crooks put us all at risk
    A group of high-tech entrepreneurs has turned the Internet into a tool for massive fraud.

    Part II: How well are we protecting ourselves?
    Businesses, governments, and citizens fail to take precautions, allowing cybercrooks to thrive.

    Part III: U.S. targets terrorists as online thieves run amok
    The U.S. government isn’t devoting the resources needed to combat Internet crime. 

    Additional, related articles and links from the Merc:

  • Online crooks often escape prosecution
  • 10 ways to protect yourself online
  • Anti-cybercrime laws a tough sell in Congress
  • San Jose police fight online crime; resources scarce in other cities
  • Legislation: Watered down, slowed down
  • Digital detective work
  • More from Part I: Storm rages across Web
  • Cybercrook’s dictionary
  • Tool prices for online criminals