Other WelchWrite Blogs: A Gardener's NotebookCareer OpportunitiesMy WordCareers in New Media

Home -- Contact Me -- Search Welchwrite.com -- Subscribe to TechIQ
Douglas' Events, Appearances and Seminar Calendar


Tuesday, September 11, 2007

Real World Example: Windows Updates mean everything

Windows Update LogoIn today's Real World Example, it seems that no matter what anti-virus and anti-spyware you have installed, if you forget to install all your Windows Updates, you can still get a pretty nasty infection.

Now, truth be told, I already knew this, and had told my client's such on many an occasion. Still, this was the first occasion where I think I can actually trace it as the cause for this particular problem. This machine was severely infected, and took a long time to clean out, even though everything looked up to date. Then I noticed that there were several, critical updates for Internet Explorer 7 that had not been installed. Once i got those installed, I was able to clean up the issues and get the machine working again.

I often describe this issue as having your door locked with 6 dead bolt locks, but leaving the window next to it wide open. Unpatched Windows flaws allow some exploits to "force feed" your computer spyware and viruses, even when you think you are protected.

So, let me climb up on the pulpit once more and deliver the 3 Commandments for Safe Computing in today's world...

1. Install all Windows Updates immediately
(or set your Windows Updates to Automatic)
2. Install and update your anti-virus program
(ClamWin (http://clamwin.org) is my current choice)
3. Install and update your anti-spyware program
(MS Defender (http://microsoft.com) is a good first line of defense)

Be well and keep your computer spyware free!

Read Previous Real World Examples

Labels: , , , , , , , , , , , , , , , , , , ,

Friday, February 16, 2007

Elsewhere Online: Default Router Passwords Could Compromise Home Networks

This Slashdot story points up a vulnerability that some people might have left exposed on their home routers from companies like Linksys, D-Link and NetGear.

Whenever I set up a router, I make sure to reset the default password for that router. This is the password that allows you to setup and change settings within the router, not the password you might use to connect to your wireless network. That said, some of you might still be using the default password.

An exploit has been discovered that allows a malicious web page to access your router setup information, if it still uses the default password, and change settings within the router. Not a good thing.

If you are wondering if your router still has its factory default password, drop me an email at techiq@welchwrite.com and I can give you some instructions that will allow you to test for it.

Drive-By Pharming Attack Could Hit Home Networks

Rob wrote in with a link to a CBR Online article discussing drive-by pharming, a new exploitation technique developed by Indiana University and Symantec Corporation. While it's not known if the technique is in use 'in the wild', the exploit could easily co-opt the web-browsing habits of a user that had not properly configured their router. "The attack works because most of the popular home routers ship with default passwords, default internal IP address ranges, and web-based configuration interfaces. The exploit is a single line of JavaScript loaded with a default router IP address, a default password, and an HTTP query designed to reconfigure the router to use the attacker's DNS servers." The article goes on to discuss several related and more advanced techniques related to this one, which security companies will have to keep in mind to guard against future attacks.

(Via Slashdot.)
Technorati Tags: , , , , , , , , , , ,

Labels: , , , , , , , , , , ,

Wednesday, January 17, 2007

Reminder: Install all Windows Updates

Just another reminder of how important it is to install all Windows Updates )and Software Updates on Macs, too) when they are released. Don't leave yourself open to attacks that can be prevented.

If you need any assistance in installing these updates, email or call douglas@welchwrite.com/818-601-0051

Attack code out for 'critical' Windows flaw Code that exploits a recently found flaw in the way Windows handles Vector Markup Language documents has been published.

(Via CNET News.com.)

Technorati Tags: , , , , , ,

Labels: , , , , , ,