Tag Archive for Windows

Malware Launches Massive Print Jobs

Malware Launches Massive Print JobsIf your printers start printing garbage characters until they run out of paper, it’s a sure sign your network has been hit by the Milicenso Trojan malware. Help Net Security reports that Symantec (SYMC) researchers have found that the garbled printouts are just a side effect of the infection and not its goal. The malware’s last variants have an extremely low detection rate – only 4 of the 42 solutions used by Virus Total detect them at the moment.

Trojan horse malwareThe article says the Milicenso Trojan is actually a backdoor used to deliver other malware on the affected machines. The infection vectors are links and malicious attachments in unsolicited emails, as well as websites hosting malicious scripts that trigger the download of the Trojan. “The Trojan creates and executes a dropper executable, which in turn creates a DLL file in the %System% folder”, shared the Symantec researchers.

The heavily encrypted DLL file creates a number of EXE and DLL files and uses a number of routines to discover whether the execution environment is a virtual machine, public malware sandbox or a black-boxing site. The Trojan also drops a piece of adware, whose aim is to serve as a decoy for AV solutions present on the machines. The blog says the  Adware.Eorezo has only one goal: to point Internet Explorer to an ad-relater URL.

Sandbox environmentHelp Net Security explains the malware triggers the massive printing by exploiting the Windows default print spooler directory. “During the infection phase, a .spl file is created in [DRIVE_LETTER]system32Spool PRINTERS[RANDOM].spl. Note the Windows’ default print spooler directory is %System%spoolprinters.”

The researchers explained “The .spl file, while appearing to be a common printer spool file, is actually an executable file and is detected as Adware.Eorezo. Depending on the configuration, any files, including binary files, created in that folder will trigger print jobs.”

rb-

I have written about the risks of copiers and printers here and here. I’m sure someone will figure out how to use this malware as a direct DOS on printers, and not as a side effect.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Better Mobile Security

Better Mobile SecuritySmartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer’s email or messaging server. IT staff can take steps to protect the data on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

Choose encryption and use itTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption, it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MSI) business-oriented smartphones offer encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.

Set a lock PIN or password:Tip No. 2 – Set a lock PIN or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Setup remote trackingTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60-day free trial.
  • For Android, you have to use a third-party app.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Limit Wi-Fi hotspot usageTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Use an antivirus or security app:Tip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

The Tablet PC has long been a pet project for Microsoft founder Bill Gates, who showed the first Tablet PC prototype in 2000 at Comdex. Mr. Gates described the device, which featured input via stylus only, as an evolutionary step in PC functionality and usability. For the next ten years leading up to CEO Steve Ballmer‘s introduction of the new “slates”, which support Windows 7 touchscreen features, the company has tried to make the Tablet catch on but with little success according to PCWorld.

MSFT Office Coming To iPad Next Year – Report

Microsoft Office for the MacMicrosoft may be bringing Office to the iPad next year, according to a report in The Daily. The report cites unnamed sources and says that Microsoft (MSFT) will also update its version of Office for the Mac next year.

On a business level, it might make sense the Apple (AAPL) iPad is making inroads into the enterprise, and having some sort of Office client available for it would let Microsoft earn at least some money from these Apple invaders. It would also help make sure that Office 365 the company’s cloud-based business services would work on the iPad according to the BusinessInsider,

Microsoft might even do this at the risk of driving some enterprise customers to stick with iPads instead of adopting Windows 8 tablets. After all, Office and related back-end products have been driving Microsoft’s growth for the last year, while Windows sales have been pretty stagnant (I wrote about Office’s profitability here).

The BusinessInsider points out that Microsoft has NEVER released Office for the Mac in the same year (or before) Office for Windows. Microsoft is building Office 15 for Windows. It’s going to be a ton of work to revamp it to work with the Windows 8 tablet interface, or risk having it relegated to traditional PCs only (and having one less reason for customers to choose Windows 8 tablets). The Mac version of Office almost always comes a year after the Windows version. It COULD be different this time, but that would require a diversion of resources to a minority platform (the Mac still has less than 5% market share for personal computers).

Microsoft said through a spokesperson: “We already deliver Office on multiple platforms and devices and are committed to expanding in the future, but have nothing further to share today.”

BI says that expanding Office to the iPad is not crazy.

Related articles

Dell Streak Discontinued

DellThe Dell Streak 7 tablet won’t even get to turn one year old. The BusinessInsider noted that Dell (DELL) is pulling the plug on its unremarkable tablet, as indicated on its site.

This is only shortly after discontinuing the Dell Streak 5 as well.

BI recalled Walt Mossberg‘s February 2011 AllThingsD review of the tablet, he sums it all up with one sentence: “I found the compromises Dell made to get to that low price make it impossible for me to recommend the Streak 7.

rb-

I wrote about hardware companies abandoning the tablet market in 2012 here. Does this move make Dell a market leader?

Related articles

Proof That The PC Is Dying

Proof That The PC Is DyingThe BusinessInsider noted this excellent chart from Horace Dediu @asymco as proof that the PC is dying a slow, painful death. Mr. Dediu’s chart shows PC sales, including Google (GOOG) Android and Apple (AAPL) iOS devices, from the dawn of time to today.

As you can see, PC sales have started to go flat. Based on recent numbers from last quarter, they may have already hit their peak.

proof that the PC is dyingMeanwhile, Macs are gaining steady momentum while Android and iOS tablet devices are blowing up.

One thing BI thinks could break the trend is all those fancy new Ultrabooks displayed at CES. Those could give PC sales a major boost considering how cheap and efficient they are.

Related articles

Apple Sues Chinese Outfit for Heresy

Apple Sues Chinese Outfit for HeresyApple (AAPL) is suing a Chinese company for making graven idols of its founder Steve Jobs reports TechEye. Chinese company In Icons created an “eerily realistic” 12-inch action figure of Steve Jobs. TechEye says the model comes with the clothes and accessories such as the black faux turtleneck, blue jeans and sneakers. It was being sold in a box that looks like Walter Isaacson‘s “Steve Jobs” biography cover and comes with a chair, a “One More Thing…” backdrop, as well as two red apples, including one with a bite in it.

Apple sees this as an affront and has told In Icons that using Apple’s logo or products, or Jobs’ name or appearance, is a “criminal offense.” The article points out that the Pope and Elvis have similar deals on their merchandise.

But it is clear that its threat is going nowhere In Icons is not giving up.

Tandy Cheung, the entrepreneur behind In Icons told TechEye said that he was an Apple fanboy, and a lot of people like him want to have Jobs’ action figure. Cheung spoke with several lawyers from Hong Kong who told him that he wasn’t in violation unless he decided to brand any of his designs with Apple products or logos. He told IB Times that Steve Jobs was not an actor, he’s just a celebrity. There is no copyright protection for a normal person. Steve Jobs is not a product.

BuzzFeed updates that the promo pics from toy company In Icons might suggest that the late Apple co-founder comes with cool accessories, like an iPad tablet, but alas. For $99 all you get is the black turtleneck-clad 12” action figure, no assembly required. Due to U.S. release in late February.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Mobile Device Info

Mobile Device InfoIn case there was any doubt that mobile devices are the real deal, here are some stats from Digby. Globally, 80% of consumers have used computers to get access to the Web within the previous seven days. Sixty percent used their mobile devices to do so. 25% of US mobile web users only access the web from their mobile phones.

Angry Birds know where you live

Angry Birds know where you live75% of the public may be giving away their physical location when downloading smartphone applications, according to mobile security vendor AdaptiveMobile. 69% of smartphone users say such privacy breaches are unacceptable, yet Help Net Security reports that 75% fail to read the terms and conditions, which include access to data such as their physical location.

Consumers are outraged that their data may not be secure but are unwilling to protect themselves,” AdaptiveMobile VP of Handset Security, Ciaran Bradley says in the article. “We are downloading more apps than ever before, but people are unaware that their location and other information can be harvested by applications.

AdaptiveMobile research has shown that common applications including Angry Birds, Jaws, and Paper Toss have access to information including location coordinates and owner’s name, which can be shared with up to 17 different external domains including advertisers.

Consumers and the wider mobile industry need to become savvier about the information which is shared by apps,” Mike Hawkes, Chairman of The Mobile Data Association told Help Net Security. “It is becoming commonplace that personal information is shared with advertisers and developers.”

Mr. Bradley told Help Net Security that iPhone users are the most careless, with 65% completely unaware that free applications may compromise their privacy. Windows Phone users are more responsible, with 29% promising to stop downloading free applications if they had any doubt that their personal information was not safe. Windows Phone users are generally cautious, 95% of them are ‘quite’ or ‘very’ concerned about privacy infringements.

If we are to slow the rise in cybercrime, consumers need to become more aware of the need for phone security” concluded Mr. Bradley. “Not only will this frustrate hackers and other cybercriminals, but also ensure that consumers can have a safe mobile experience.”

rb-

I wrote about mobile apps stealing PII here and here.

Related articles

Cisco’s Tablets Are Doing So Well, They’re Planning At Least Two More Models For Next Year

Cisco Cius tabletThe Cisco Cius tablet for enterprises sounded like a hard sell when Cisco introduced it. But the company is apparently proving experts wrong, including me (I wrote about the Cius here and here) because Cisco‘s (CSCO) tablets are doing well enough that the company plans to release two new form factors next year, including a 10-inch version according to the BusinessInsider

Product manager Chuck Fontana told the BusinessInsider that 1,000 companies have already bought the tablet, He wouldn’t share device unit sales, but some deployments are in the hundreds, and one company plans to buy 1,500 for its mobile sales force. The tablets are sold as part of a broader communications package and include Cisco’s teleconferencing and collaboration services.

But underneath they’re straight Google (GOOG) Android tablets and can run any Android app. To prevent employees from downloading malware-infested or low-quality apps, Cisco has rolled out a custom app store called AppHQ, where every app is vetted.

The BusinessInsider says the Cius is an interesting demonstration of how the relative openness of Android versus iOS is helping it gain traction in surprising places. Cisco didn’t go to quite the lengths that Amazon (AMZN) did with the Kindle Fire, where it basically forked Android and created a custom OS. But Android is open enough that Cisco could build its own app store and ship it with its own apps front and center.

That couldn’t have worked with the iPad, where Apple (AAPL) controls the experience.

So would Cisco consider offering a Windows tablet instead once Microsoft (MSFT) Windows 8 comes out?  “No,” said Fontana, “we’re not looking to do anything from a Windows perspective. Our core approach remains on Android.

Related articles

People Are Losing Interest In The Microsoft Tablet, And It’s Not Even Out Yet

Microsoft TabletApple‘s (AAPL) iPad has already taken about 11% of the PC market, and by the time Microsoft (MSFT) and its partners get around to releasing a real competitor next year, it may be too late according to a new study from Forrester Research (FORR) in the BusinessInsider.

Near the beginning of 2011 according to the article Forrester surveyed 3,835 consumers who were considering buying a tablet. When asked which operating system they’d like on it, 48% said Windows, well ahead of iOS (16%) and Google’s (GOOG) Android (9%). The second most popular choice was “undecided” with 16%.

In September, Forrester asked the same question of a different group of 2,229 consumers. This time, iOS came in number one with 28% of the vote. Windows had only 25%, and Android was at 18%. A whole 24% were still undecided.

Overall, interest in Windows tablets dropped 21 percentage points in six months.

The BusinessInsider says the study is probably a bit skewed but says the data shows a real perception shift: consumers are thinking of tablets more like smartphones and less like PCs. That perception could carry through to the next time they’re thinking of buying a new computing device.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Does Malware Spread?

The ZDNet Zero Day blog reports that Microsoft’s (MSFT) recently released Security Intelligence Report identified socially engineered malware (scareware pop-ups; blackhat search engine optimization attacks) enticing users into downloading and executing a malicious file as the most used malware propagation tactic.

ScarewareBased on a sample of 600 million systems worldwide, MSFT research ranks AutoRun USB infection as the second most used malware propagation tactic, according to Zero Day. Microsoft disabled AutoRun by default on Windows XP and Vista in February to prevent malware infections. The results, at least according to Microsoft, have indicated a significant decline in malware using AutoRun as a spreading mechanism.

The report also points out that zero-day flaws do not necessarily represent a driving force in the growth of malicious attacks or cybercrime in general according to the ZDNet blog. More propagation tactics:

  • User Interaction required – 44.8%
  • AuAuto-run malwaretoRun USB – 26%
  • AutoRun: Network – 17.2%
  • File Infector – 4.4%
  • Exploit: Update Long Available – 3.2%
  • Exploit: Update Available – 2.4%
  • Password Brute Force – 1.4%
  • Office Macros – 0.3%
  • Exploit: Zero Day – 0%

Zero Day points out that Microsoft is missing malware that spreads without user interaction, namely through the exploitation of client-side vulnerabilities in third-party software and browser plugins.  The MSFT report says attackers regularly exploit client-side Java. Java exploits were responsible for between one-third and one-half of all exploits observed in the four most recent quarters including:

rb-

I wrote about the problems with old versions of Java and JavaRa which can delete all the old unnecessary files java leaves on your hard drive everything Sun Oracle plugs some more holes in their app.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.