Wednesday, November 22, 2017

How to delete downloaded Windows Update files



Windows Update works for the most part pretty reliably. It is an automated system of Microsoft's Windows operating system that handles the downloading and installing of updates for the operating system.

At best, it is a silent service that runs in the background; it may ask you to restart the PC every now and then though as that is still required for many updates.

When you run into issues though with updates, you may spend hours or even days figuring out what is going wrong.

I cannot update one of my PCs to the Windows 10 Fall Creators Update for instance because of a bluescreen that I get whenever I try.

One of the things that you can try when it comes to updates, is to delete downloaded Windows Update files to start over.

If you suspect that something is wrong with the files, or if you want Windows Update to run a new check for updates to download new versions of updates that were released by Microsoft, then you may find the following tip useful for that.

If you run Windows Insider builds on a PC for instance, you may skip an already downloaded update to a new build to download a newer build and avoid having to update the system multiple times.

How to delete downloaded Windows Update files

It is thankfully pretty easy to delete all cached update files. This works on all supported versions of Windows, including Windows 7, Windows 8.1 and Windows 10.
  • Go to C:\WINDOWS\SoftwareDistribution\Download using Explorer or any third-party file browser. If you navigate to the folder manually, you may need to enable the showing of hidden files first.
  • Select all files of the folder. The easiest way to do that is to use Ctrl-A while the folder is active.
  • Hit the Delete-key on the computer keyboard.
  • Windows may need administrator privileges to delete certain files. Select "do this for all current items" and click continue to grant the permissions.

Ransomware-spreading hackers sneak in through RDP – Naked Security

by Mark Stockley



Thanks to Sophos security experts Peter Mackenzie and Paul Ducklin for their behind-the-scenes work on this article.



If there’s an unexploited niche caused by insecure software or behaviour then sooner or later a crook is going to wiggle into it and attempt to use it as a way to make money from someone else’s misery.



Sophos has recently uncovered a new ecological niche in the great internet hack-o-sphere that’s equal parts low-cunning and directness: crooks who are breaking into computers one at a time and running ransomware on them manually – clickety click – in the same way that you might run Word, Notepad or Solitaire.



Let me do that!

We normally think of ransomware as something that’s catapulted into victims’ computers using some form of mass distribution.



For example, the criminals behind WannaCry and NotPetya used a stolen NSA exploit to create worms that copied themselves from one computer to another, encrypting files, demanding ransoms and creating mayhem as they zig-zagged through and between networks.



More common still is phishing. Why bother with worms and exploits when you can simply sign up for crimeware online and click a button to crank out booby-trapped email attachments?



Phishing is a numbers game: most of your emails won’t get through, many of those that do will go unread, and even those that get opened may find themselves hitting a brick wall – a patched system, for example, or a user who realises that something phishy is going on and stops just short of getting infected.



The phishing crooks only make money if they can repeatedly find new ways to persuade users to open emails and do things their IT team have warned them about, such as saving attachments to disk and then launching them, or opening Office documents and deliberately enabling macros.



For this reason, some cybercriminals have decided that if you want something doing properly, you have to do it yourself.



The attack

Many companies, notably small businesses, outsource their IT to, or pay for lots of help from, outside contractors.



These contractors might live in another part of town, or elsewhere in the country, or even on the other side of the world.



To let remote sysadmins look after your Windows networks, the most widely-used tool is Microsoft’s own Remote Desktop Protocol, or RDP for short.







RDP, for those who haven’t used it, effectively turns your IT guy’s laptop into a remote screen, keyboard and mouse connected over the internet to your local computer.



When they move their mouse in the RDP client software far away, they’re controlling your computer; when a software dialog pops up, they see it on their remote computer.



RDP is like being right there, and allows remote use even of fully-graphical applications that can’t be scripted or operated via a command prompt.



In other words, the RDP password you’ve chosen for your remote sysadmin (or that you’ve let them choose for themselves) is essentially the key to your office – a weak password is like a server room door that’s propped open, inviting any passing snooper to take a look inside.



So, if the crooks notice that you’ve got RDP open to the internet, for example by using a network search engine such as Shodan, you can be sure they’ll take a poke around.



Sophos security experts who’ve investigated a spate of recent RDP attacks have frequently found evidence that a tool called NLBrute was used to try a whole range of RDP passwords – a so-called brute force attack – in the hope of sneaking in.



Once they’ve got your RDP password – whether they use NLBrute, or simply look you up on Facebook to find your birthday and your pet’s name – they’ll logon and immediately create various brand new administrative accounts.



That way, even if you get rid of the crooks and change your own admin password, they’ve already got backup accounts they can use to sneak back in later.



What next?

Once they’re in, here’s what you can expect to happen next, based on what we’ve seen in a number of attacks we’ve investigated:



  • The crooks download and install low-level system tweaking software, such as the popular Process Hacker tool.


Tools of this sort are regularly used by legitimate sysadmins for troubleshooting and emergency recovery, especially if they use kernel drivers to let you to pull off modifications that the operating system usually prevents. This includes: killing off processes that usually disallow shutdown, deleting locked files, and changing configuration settings that are usually locked down.



  • The crooks turn off or reconfigure anti-malware software, using the newly-installed tweaking tools.


The crooks go after the passwords of administrator accounts so that they’ll enjoy all the power of a legitimate sysadmin. If they can’t get an admin password, they may try logging in as a regular user and running hacking tools that try to exploit unpatched vulnerabilities to get what’s called EoP, or elevation of privilege.



EoP means that already logged-on users can sneakily promote themselves to more powerful accounts to boost their powers. We’ve seen EoP tools left behind on attacked systems that tried to abuse vulnerabilities dubbed CVE-2017-0213 and CVE-2016-0099, patched by Microsoft back in May 2017 and March 2016 respectively.



  • The crooks turn off database services (e.g. SQL) so that vital database files can be attacked by malware.


Files such as SQL databases are usually locked while the database server software is active, as a precaution against corruption that could be caused by concurrent access by another program. The side-effect of this is that malware can’t get direct access to database files either, and therefore can’t scramble them to hold them to ransom.



  • The crooks turn off Volume Shadow Copy (the Windows live backup service) and delete any existing backup files.


Shadow copies act as real-time, online backups that can make recovery from ransomware a quick and easy process. That’s why crooks often go looking for shadow copies first to remove them.



You can guess what happens next.



  • The crooks upload and run ransomware of their choice.


Because they’ve used their sysadmin powers to rig the system to be as insecure as they can, they can often use older versions of ransomware, perhaps even variants that other crooks have given up on and that are now floating around the internet “for free”.



The crooks don’t have to worry about using the latest and greatest malware, or setting up a command-and-control server, or running a hit-and-hope spam campaign.



In one attack, we saw a folder on the desktop containing four different types of ransomware. The crooks ran each in turn, until one of them worked.



How much is the ransom?

Many ransomware attacks are distributed indiscriminately, and therefore rely on a “pay page” – a Dark Web server set up specially to tell victims how much to pay, and how to pay it.



But these RDP crooks are already personally involved to the extent of logging into your network themselves, so there’s often what you might call a “personal touch”.



Rather than automatically squeezing you via a website, you’ll probably see a pop-up something like this, telling you to make contact via email to “negotiate” the release of your data:



At the time of writing the Bitcoin address used by that attacker contained BTC 9.62, currently worth just over $60,000.

Only one of the transactions matched the 1BTC amount demanded in the ransom, which might indicate that the account is being used for other activities at the same time, or that some victims managed to negotiate a lower price.


The victims

The victims of this kind of attack are almost always small-to-medium companies: the largest business in our investigation had 120 staff, but most had 30 or fewer.

With small scale comes a dependence on external IT suppliers or “jack-of-all-trades” IT generalists trying to manage cybersecurity along with many other responsibilities.

In one case a victim was attacked repeatedly, because of a weak password used by a third-party application that demanded 24-hour administrator access for its support staff.

What to do?

  • If you don’t need RDP, make sure it’s turned off. Remember to check every computer on the network: RDP can be used to connect to servers, desktops and laptops.
  • Consider using a Virtual Private Network (VPN) for connections from outside your network. A VPN such as the one in Sophos XG Firewall and Sophos UTM requires outsiders to authenticate with the firewall first, and to connect from there to internal services. This means software such as RDP never needs to be exposed directly to the internet.
  • Use two-factor authentication (2FA) wherever you can. Sophos XG Firewall and Sophos UTM support 2FA, so that you need a one-time logon code every time. If crooks steal or guess your password, it’s no use on its own.
  • Patch early, patch often. This prevents crooks exploiting vulnerabilities against your network as quickly as possible, thus reducing your exposure to danger.
  • After an attack, check to see what the crooks have changed. Don’t just remove the malware or apply the missed patches and be done with it. Especially check for added applications, altered security settings, and newly-created user accounts.
  • Set a lockout policy to limit password guessing attacks. With three guesses at a time followed by a five-minute lockout, a crook can only try out 12 x 3 = 36 passwords an hour, which makes a brute force attack impractical.

If you’re using a third-party IT company and they haven’t already suggested the precautions we’ve listed above, why not ask them why, and ask yourself if they’re the right people to be looking after your network?

Be careful out there – don’t let the Remote Desktop Protocol for your IT team turn into a Ransomware Deployment Process for criminals.



Ransomware-spreading hackers sneak in through RDP – Naked Security

Mozilla terminates its deal with Yahoo and makes Google the default in Firefox again | TechCrunch

Posted Nov 14, 2017 by Frederic Lardinois (@fredericl)



With the launch of Firefox Quantum, Mozilla released what’s probably the most important update to its browser in recent years. It’s faster, lighter and you should give it a try. And as you do so, you’ll notice another change: Google is now the default search engine again — at least if you live in the U.S., Canada, Hong Kong and Taiwan.



In 2014, Mozilla struck a deal with Yahoo to make it the default search engine provider for users in the U.S., with Google, Bing, DuckDuckGo and others as options. While it was a small change, it was part of a number of moves that turned users against Firefox because it didn’t always feel as if Mozilla had the user’s best interests in mind. Firefox Quantum (aka, Firefox 57), is the company’s effort to correct its mistakes and it’s good to see that Google is back in the default slot (Disclaimer: TechCrunch is part of Oath, Verizon’s roll-up of AOL and Yahoo, though nobody at TechCrunch that I know has ever willingly used Yahoo Search).



When Mozilla announced the Yahoo deal in 2014, it said that this was a five-year deal. Those five years are obviously not up yet. We asked Mozilla for a bit more information about what happened here.



“We exercised our contractual right to terminate our agreement with Yahoo! based on a number of factors including doing what’s best for our brand, our effort to provide quality web search, and the broader content experience for our users. We believe there are opportunities to work with Oath and Verizon outside of search,” Mozilla Chief Business and Legal Officer Denelle Dixon said in a statement. “As part of our focus on user experience and performance in Firefox Quantum, Google will also become our new default search provider in the United States, Canada, Hong Kong and Taiwan. With over 60 search providers pre-installed as defaults or secondary options across more than 90 language versions, Firefox has more choice in search providers than any other browser.”



As Recode reported last year, there was a clause in the Mozilla deal that would have the potential Yahoo acquirer pay $375 million per year through 2019 if Mozilla didn’t want to work with the buyer. This clause also allowed Mozilla to walk away at its sole discretion. We don’t know if Mozilla invoked this clause to terminate the agreement, but it seems likely.



This move makes Google Mozilla’s default search engine in most of the world, with the exception of China, where the default is Baidu, and Russia, Turkey, Belarus and Kazakhstan, where Yandex is the default.



Historically, search engine royalties have been the main revenue driver for Mozilla. Back in 2014, the last year of the Google deal, that agreement brought in $323 million of the foundation’s $330 million in total revenue. Neither Google nor Mozilla discussed the financial details of this new deal, though once Mozilla releases its annual financial statement, we’ll get a better idea of what that looks like.



Mozilla terminates its deal with Yahoo and makes Google the default in Firefox again | TechCrunch

Hackers Claim to Break Face ID a Week After iPhone X Release | WIRED






When Apple released the iPhone X on November 3, it touched off an immediate race among hackers around the world to be the first to fool the company's futuristic new form of authentication. A week later, hackers on the actual other side of the world claim to have successfully duplicated someone's face to unlock his iPhone X—with what looks like a simpler technique than some security researchers believed possible.



On Friday, Vietnamese security firm Bkav released a blog post and video showing that—by all appearances—they'd cracked Face ID with a composite mask of 3-D-printed plastic, silicone, makeup, and simple paper cutouts, which in combination tricked an iPhone X into unlocking. That demonstration, which has yet to be confirmed publicly by other security researchers, could poke a hole in the expensive security of the iPhone X, particularly given that the researchers say their mask cost just $150 to make.



But it's also a hacking proof-of-concept that, for now, shouldn't alarm the average iPhone owner, given the time, effort, and access to someone's face required to recreate it.



Bkav, meanwhile, didn't mince words in its blog post and FAQ on the research. "Apple has done this not so well," writes the company. "Face ID can be fooled by mask, which means it is not an effective security measure."





In the video posted to YouTube, shown above, one of the company's staff pulls a piece of cloth from a mounted mask facing an iPhone X on a stand, and the phone instantly unlocks. Despite the phone's sophisticated 3-D infrared mapping of its owner's face and AI-driven modeling, the researchers say they were able to achieve that spoofing with a relatively basic mask: little more than a sculpted silicone nose, some two-dimensional eyes and lips printed on paper, all mounted on a 3-D-printed plastic frame made from a digital scan of the would-be victim's face.



The researchers concede, however, that their technique would require a detailed measurement or digital scan of the face of the target iPhone's owner. The researchers say they used a handheld scanner that required about five minutes of manually scanning their test subject's face. That puts their spoofing method in the realm of highly targeted espionage, rather than the sort of run-of-the-mill hacking most iPhone X owners might face. 1



"Potential targets shall not be regular users, but billionaires, leaders of major corporations, nation leaders, and agents like FBI need to understand the Face ID's issue," the Bkav researchers write. They also suggest that future versions of their technique might be performed with a quick smartphone scan of a victim’s face, or even a model created from photographs, but didn't make any predictions about how easy those next steps might be to engineer.



Aside from the challenge of acquiring an accurate face scan, the researchers’ simpler setup outperformed more expensive techniques for attempted Face ID trickery—namely, the ones we at WIRED tried earlier this month. With the help of a special effects artist, and at a cost of thousands of dollars, we created full masks cast from a staffer's face in five different materials, ranging from silicone to gelatin to vinyl. Despite details like eyeholes designed to allow real eye movement, and thousands of eyebrow hairs inserted into the mask intended to look more like real hair to the iPhone's infrared sensor, none of our masks worked.



By contrast, the Bkav researchers say they were able to crack Face ID with a cheap mix of materials, 3-D printing rather than face-casting, and perhaps most surprisingly, fixed, two-dimensional printed eyes. The researchers haven't yet revealed much about their process, or the testing that led them to that technique, which may prompt some skepticism. But they say that it was based in part on the realization that Face ID's sensors only checked a portion of a face's features, which WIRED had previously confirmed in our own testing.



"The recognition mechanism is not as strict as you think," the Bkav researchers write. "We just need a half face to create the mask. It was even simpler than we ourselves had thought."

Without more details on its process, however, plenty about Bkav's work remains unclear. The company didn't respond to the majority of a long list of questions from WIRED, saying that it plans to reveal more in a press conference later this week.

Most prominent among those questions, points out security researcher Marc Rogers, is how exactly the phone was registered and trained on its owner's real face. Bkav's staff could have potentially "weakened" the phone's digital model by training it on its owner's face while some features were obscured, Rogers suggests, essentially teaching the phone to recognize a face that looked more like their mask, rather than create a mask that truly looks like the owner's face.

"For the moment I can't rule out that these guys might be tricking us a bit," says Rogers, a researcher for security firm Cloudflare, who worked with WIRED on our initial attempts to crack Face ID, and was also one of the first to break Apple's Touch ID fingerprint reader in 2013.

But in response to questions from WIRED, Bkav denied any such trickery. A company spokesperson says that after crafting a mask that was able to fool Face ID—it first made four others that failed—the researchers re-registered their test iPhone X on the face of Bkav's staffer, to make sure that it hadn't biased the phone's model of his face. After that, they never entered a passcode into the phone, and yet the mask alone unlocked it.1

Bkav's history also lends its demonstration some credence. Nearly a decade ago, the company's researchers found that they could break the facial recognition of laptop makers including Lenovo, Toshiba, and Asus, with nothing more than two-dimensional images of a user's face. They presented those widely cited findings at the 2009 Black Hat security conference.

If Bkav's findings do check out, Rogers says that the most unexpected result of the company's research would be that even fixed, printed eyes are able to deceive Face ID. Apple patents had led Rogers to believe that Face ID looked for eye movement, he says. Without it, Face ID would be left vulnerable not only to simpler mask spoofs, but also attacks that could unlock an iPhone X even if the owner is sleeping, restrained, or potentially even dead.

The last of those situations is especially worrying, since it would theoretically be a problem for Face ID that even Touch ID didn't present, given that the latter checks for the conductivity of a living person's finger before unlocking. "That would mean this could be tricked without any liveness test at all," Rogers says. "I would say if this is all confirmed, it does mean Face ID is less secure than Touch ID." It's also unclear if Face ID uses any methods beyond eye movement to indicate that someone is alive. (At least one researcher points out that Touch ID make also work on a corpse: SR Labs' Ben Schlabs sent WIRED a video unlocking an iPhone SE with an altogether non-living foam-backed fake fingerprint.)2

Despite the potential threat of snooping on a sleeping, kidnapped, or dead person’s iPhone X, Rogers considers the notion that someone will make a silicone-and-plastic mask of the average person's face far-fetched. A far more practical concern is someone simply tricking a victim into glancing at their phone.

"This is still not the kind of attack the average person on the street should worry about," Rogers says of Bkav's work. "It’s still probably easier to snatch the phone and just show it to someone to unlock it."

1Updated 11/13/2017 9:30 am EST with more information from Bkav.2Updated 11/13/2017 10:55 am EST with a comment from SR Labs on unlocking Touch ID with a non-living finger.



Hackers Claim to Break Face ID a Week After iPhone X Release | WIRED

Using E-Mail Encryption to Combat Cyber Breaches

Given the prevalence of email-based attacks, and the growing number of phishing attacks containing ransomware occurring globally, email security should be a forefront concern for any organization.



By Industry Perspectives | Nov 07, 2017



In the month following the Deloitte breach, consumers and businesses are still at risk of having personal and proprietary information stolen. The Deloitte hack compromised critically private information of six “blue chip” clients including usernames, passwords, IP addresses, and health information. Deloitte failed to utilize multi-factor authentication on a portion of their email system, giving cyber criminals easy access to the accounts.



The cyber criminals then sifted through emails looking for any valuable information they could use or sell for a profit. While the Deloitte hack was contained and only affected six clients, consumers and businesses are at risk from any organization that stores sensitive information about them and fails to implement critical cybersecurity measures. Consumers and businesses can have their information compromised by a variety of organization including healthcare organizations, educational institutions, legal firms, accountancy firms, financial institutions, and businesses/third party vendors through data contained in email accounts.



Regardless of the type of organization, there should be a greater level of responsibility and protection for consumer and client information. Organizations have failed to implement cybersecurity, and it is now an epidemic. By 2019, cybercrime will cost the global economy an estimated $2.1 trillion dollars.  To protect consumers and themselves, organizations must implement cybersecurity measures. Given the prevalence of email-based attacks, and the growing number of phishing attacks containing ransomware occurring globally, email security should be a forefront concern for any organization.



A critical first step is to ensure the use of multi-factor authentication for account logins. This added layer of security is integral to account protection and user verification. Cybercriminals seek out the easiest targets to make the fastest profit, utilizing multi-factor authentication encourages the criminal to move onto the next target. 



Another consideration for organizations is email encryption. Despite valiant efforts to keep cyber criminals from gaining access to email accounts, inevitably they will find a way in. Each employee with a company email address is a potential point of entry for a cybercriminal. Negligent employees that don’t follow password protocols, fall victim to phishing schemes, and download third party applications that contain malware, create opportunities for cyber criminals to gain access.



In the case of Deloitte, once cybercriminals gained access to the account they downloaded and archived the data to servers overseas to later sort through for any valuable information. Email encryption services put two-factor authentication and an extra level of security on all emails sent, eliminating the value proposition for cyber criminals by disallowing their ability to read the encrypted emails. It would be like breaking into a bank, but the vault is empty. 



Securing and protecting email accounts is a critical consideration for organizations of all sizes, from Big Four CPA firms to small businesses. Organizations should begin waging the war against cybercrime today by implementing multi-factor authentication for email accounts and considering an email encryption service. Increased global productivity through advances in technology should not come at the cost of privacy and security.



Using E-Mail Encryption to Combat Cyber Breaches

Google Now Shows Wait Times For Restaurants And Grocery Stores | HuffPost

Google Now Shows Wait Times For Restaurants And Grocery Stores
Now you just have to figure out what to eat.



By Carly Ledbetter



Google just solved one of the biggest hassles associated with going out to eat: gauging the accurate wait time. 



The tech company announced Tuesday that it’s introducing average wait times for around 1 million restaurants, based on anonymized historical data, according to a press release.



Starting today, you’ll be able to see the feature when you type in a restaurant’s name in local search on mobile or desktop. It’s not yet available on the Maps and Search apps but by Thanksgiving, Google hopes to have wait times ready for grocery stores. 







The pink bar shows the “live” setting― what wait times look like for the restaurant at that very moment. 



To access the Wait Times feature, type in a restaurant’s name, click to open the listing and look at the Popular Times feature. Simply click on the hour bars of the time you want to go to the restaurant and Google will give you the estimated wait time. 



With this helpful innovation, you’ll hopefully spend less time stuck in line at the grocery store or taking out your hanger on unsuspecting patrons. Now you just have to figure out WHAT to eat. 



Original Article at:

Google Now Shows Wait Times For Restaurants And Grocery Stores | HuffPost

Tuesday, November 21, 2017

Five common scams consumers should avoid

Rippleshot recently released an infographic highlighting five common scams consumers should avoid, including phishing scams involving recognizable companies such as Amazon and Netflix and scams impersonating banks. In addition, Rippleshot provided tips to help consumers actively protect themselves from credit card fraud. Tips include using secure passwords, watching out for ATM skimmers and reporting suspicious activity immediately.


ConsumerCreditScamsInfographic.pdf

The Great Tariff Caper