Welcome to The Hand Lettering Forum!
This is an interactive Bulletin Board on the topics of Sign making, design, fabrication, History, old Books and of coarse Letterheads, Keepers of the craft. The Hand Lettering Forum features links to resources, sign art history, techniques, and artists profiles. Learn more about Letterheads at https://theletterheads.com. Below you'll see Mchat has been added as a live communication portal for trial, and the Main forum Links are listed below.

Windows Internet Explorer threat

Hand Lettering topics: Sign Making, Design, Fabrication, Letterheads, Sign Books.

Moderators: Ron Percell, Mike Jackson, Danny Baronian

Post Reply
Mike Jackson
Site Admin
Posts: 1705
Joined: Tue Apr 06, 2004 11:02 pm
Location: Jackson Hole, WY
Contact:

Windows Internet Explorer threat

Post by Mike Jackson »

Hi all,
I was reading a clip in the newspaper at lunchtime about some Internet Explorer issues needing addressing on all machines, especially Windows XP and Internet Explorer 7.

http://www.us-cert.gov/cas/techalerts/TA08-344A.html

The article says this threat is critical. A virus or trojan can infect your machine just by visiting some web pages.

With autoupdates checked in your system, you should be updated on your next scheduled event, but it might be worth doing it daily for a while.

M. Jackson

Here's another story from Computerworld:
http://www.computerworld.com/action/art ... c=hm_topic
December 15, 2008 (Computerworld) Microsoft Corp. last week acknowledged that its massive December security update didn't include patches for potentially critical vulnerabilities in Windows and Internet Explorer.

The company last Tuesday released patches for 28 software flaws; it was Microsoft's biggest batch of fixes since it launched the regular monthly update schedule more than five years ago.

Later that day, Microsoft said that "limited and targeted" attacks were under way by hackers exploiting an unpatched flaw in the WordPad Text Converter tool bundled with Windows.

The company said that users must be tricked into opening the malicious files, which are likely to be delivered as e-mail attachments.

A day later, Microsoft acknowledged an unpatched vulnerability in IE 7 after code needed to maliciously use it was released -- mistakenly -- by Chinese security researchers. The flaw can infect computers running IE7 on Windows XP.

In a security advisory, Microsoft warned users about the IE flaw and listed countermeasures to take in lieu of a patch. It did not say whether it would patch the bug.

VeriSign Inc.'s iDefense Labs unit said that a blog post from the Chinese research team reported that the attack code at one time traded for $15,000 on underground markets.

The December updates include eight patches for bugs in Windows, Internet Explorer, Office, SharePoint, Windows Media, Visual Basic and Visual Studio. Microsoft ranked 23 of the 28 vulnerabilities fixed by the patches as critical, the top rating in its four-step scoring system.

Researchers agreed that the first patch IT managers should apply is one for the Windows Graphics Device Interface (GDI).

Andrew Storms, director of security operations at nCircle Network Security Inc., said hackers could exploit the GDI vulnerabilities by duping users into opening or viewing malicious Windows Metafile images.

Other GDI bugs have been patched in the past, and Storms said the continual patching of the graphics rendering engine will likely lead to questions about the efficacy of Microsoft's Security Development Lifecycle process, which looks for bugs as code is written.

"I think that's a fair question," said Wolfgang Kandek, chief technology officer at Qualys Inc. "But is it realistic to expect Microsoft to find everything? No, it's not."

This version of the story originally appeared in Computerworld's print edition.

Mike Jackson / co-administrator
Golden Era Studios
Vintage Ornamental Clip art
Jackson Hole, WY

Photography site:
Teton Images
Jackson Hole photography blog:
Best of the Tetons
DAVE SMITH
Posts: 1213
Joined: Sat Jul 10, 2004 11:12 am
Location: ENGLAND

Post by DAVE SMITH »

I heard this here also this morning listening to the radio.
Thanks for the info Mike.
Dave
Mike Jackson
Site Admin
Posts: 1705
Joined: Tue Apr 06, 2004 11:02 pm
Location: Jackson Hole, WY
Contact:

Post by Mike Jackson »

Personal update:

My Windows XP machine has been doing constant updates all along.
I checked the older Windows 2000 machines in the shop and in Darla's office.

To get the auto updates on those two machines, I had to update the system to service pack 4.

There was another virus alert last week for people using Facebook (a similar virus that attacked people using MySpace). The message would tell people they had to download a new Flash player to view the clips, but it was actually a disguise for the virus getting dowloaded.

I noticed today on both machines that it wanted to load a new Flash player, so I said NO. I believe the better way would be to go directly to the Flash Player site and get it there, vs something that pops up.

As far as I can tell, my systems have the Windows firewall turned on, McAfee virus protection turned on, and the latest Microsoft updates.

The news report sounded more serious than normal.

Best regards,
Mike Jackson
Mike Jackson / co-administrator
Golden Era Studios
Vintage Ornamental Clip art
Jackson Hole, WY

Photography site:
Teton Images
Jackson Hole photography blog:
Best of the Tetons
Post Reply