Updates 2023-07-11

Welcome back, Folks!

Today is Patch Tuesday for July, 2023.

This month has actually been pretty quiet. There were only 140 major hacks, and over 145 application updates this month. There are only about 4 GB of updates for most users.

This Month in Technology

1st Source Bank, Activate Healthcare LLC, Advanced Medical Management, LLC, American Airlines, American Board of Internal Medicine, Apple iOS, Arris devices, ARx Patient Solutions, ASUS routers, Atlantic General Hospital, Atomic Wallet, Atrium Health Wake Forest Baptist, Bangladesh government web portal, Barracuda ESG, Barrow County, Georgia, Beacon Ridge, BORN Ontario, BreachForums Clone, Bristol Myers Squibb, CalPERS, ChatGPT, Chilean Army, Cisco data center switches, City of San Luis, ClearMedi, Commonwealth Health Physician Network-Cardiology, Community Research Foundation, Core Recovery, LLC, D-Link devices, Des Moines Public Schools, Desert Physicians Management, Deutsche Bank AG, Dozor-Teleport, D’Youville University, EncroChat, Extreme Networks, Floating Point Group, FortiGate firewalls, G7 summit, Genworth, GlobalHealth Holdings, LLC, Grafana, Great Valley Cardiology, Hashflow, HCA Healthcare, Henrietta Johnson Medical Center, Illinois, Imagine360, Indonesian passport system, iOttie, Itasca County Health & Human Services, Jones Lang LaSalle, JumpCloud, K&L Gates, Kannact, Inc., Kinmax, Kirkland & Ellis, Lansing Community College, LetMeSpy, Limbach Facility Services LLC Group Benefit Plan, Locally, Louisiana OMV, Lumberton ISD, Maimonides Medical Center, Mastodon, MediaTek devices, Microsoft Teams, Microsoft, Missouri, Mondelez International, Mount Desert Island Hospital, MOVEit Transfer, Murfreesboro Medical Clinic & SurgiCenter, National Student Clearinghouse, Nebraska, Netgear devices, New Horizons Medical, Inc, New York City Department of Education, Nickelodeon, Nova Scotia, nuclear weapons experts, Ofcom, ONIX Group, Oregon Department of Transportation, Oregon DMV, Orrick, Herrington & Sutcliffe LLP, Paris High School, Parker Drilling Company Group Health and Flexible Benefit Plan, PBI Research Services, Peachtree Orthopaedic Clinic, P.A., Pennsylvania, Petro-Canada Gas Stations, Poly Network, Port of Nagoya, Japan, Proskauer Rose, Radisson, Razer, Realm IDX, Recovery Centers of America, Senior Choice, Inc, Shell Oil, Siemens Energy, Solar Energy Monitoring Systems, SolarView Systems, South Carolina, South Dakota, South Suburban Surgical Suites, LLC, Southwest Airlines, Sturdy Finance, Suncor Energy, Tenda devices, Texas, The Atrium, The Patriot, The Williamsport Home, Tidewater Diagnostic Imaging, Ltd., TomTom, TP-Link devices, TSMC, U.S. Department of Energy, Ukrainian Government FaceBook Page, Ultimate Member WordPress Plug-In, University of Colorado, University of Illinois, University of Manchester, University of Pittsburgh Medical Center, UofL Health, UPMC, UPS, US Federal agencies, USPTO, Vermillion, Vincera Core Physicians, Vincera Imaging LLC, Vincera Rehab LLC, Vincera Surgery Center, Vitra Home Care, LLC, Zellis, Zyxel devices, and Zyxel NAS have reportedly been hacked or compromised this month.

The state of Alaska, Taos, Azure, Microsoft 365 (multiple times), Outlook.com, Microsoft Teams, and Outlook for the web have suffered from outages this month.

Last months updates broke .NET WebApps, default browser GPO, Apple Safari on mobile, Windows Start Menu, and Windows File Explorer.

The US Federal government is still using unsecured devices across 50 different agencies. Sweden is fining companies that use Google Analytics. Microsoft is going to be permanently storing all the AI interactions with Bing to “better serve you.” Facebook parent company Meta says the only way to delete your account from their defective Threads service is to delete your Instagram account.

Now for the good news:

A federal judge has blocked the federal government from orchestrating censorship with private tech companies.

Let’s Get Busy

Now back to our regularly scheduled program.

Patch Tuesday is huge this month. The typical computer should see roughly 4 GB in updates today. Let’s get started.

Windows 10 and Windows 11 versions 22H2 should now be installed. Sadly, the new “Moments” features on Windows 11 will insert advertisements in the Start menu and Control Panel. Just another sign of the continuing decline of Windows.

Microsoft released updates to address 132 vulnerabilities in .NET and Visual Studio, ASP.NET and .NET, Azure Active Directory, Microsoft Dynamics, Microsoft Graphics Component, Microsoft Media-Wiki Extensions, Microsoft Office Access, Microsoft Office Excel, Microsoft Office Outlook, Microsoft Office SharePoint, Microsoft Office, Microsoft Power Apps, Microsoft Printer Drivers, Microsoft Windows Codecs Library, Mono Authenticode, Paint 3D, Role: DNS Server, Service Fabric, Visual Studio Code, Windows Active Directory Certificate Services, Windows Active Template Library, Windows Admin Center, Windows App Store, Windows Authentication Methods, Windows CDP User Components, Windows Certificates, Windows Clip Service, Windows Cloud Files Mini Filter Driver, Windows Cluster Server, Windows CNG Key Isolation Service, Windows Common Log File System Driver, Windows Connected User Experiences and Telemetry, Windows CryptoAPI, Windows Cryptographic Services, Windows Defender, Windows Deployment Services, Windows EFI Partition, Windows Error Reporting, Windows Failover Cluster, Windows Geolocation Service, Windows HTTP.sys, Windows Image Acquisition, Windows Installer, Windows Kernel, Windows Layer 2 Tunneling Protocol, Windows Layer-2 Bridge Network Driver, Windows Local Security Authority (LSA), Windows Media, Windows Message Queuing, Windows MSHTML Platform, Windows Netlogon, Windows Network Load Balancing, Windows NT OS Kernel, Windows ODBC Driver, Windows OLE, Windows Online Certificate Status Protocol (OCSP) SnapIn, Windows Partition Management Driver, Windows Peer Name Resolution Protocol, Windows PGM, Windows Print Spooler Components, Windows Remote Desktop, Windows Remote Procedure Call, Windows Routing and Remote Access Service (RRAS), Windows Server Update Service, Windows SmartScreen, Windows SPNEGO Extended Negotiation, Windows Transaction Manager, Windows Update Orchestrator Service, Windows VOLSNAP.SYS, Windows Volume Shadow Copy, Windows Win32K, and MSRT (~ 3 GB). This includes security updates. A reboot is required.

Apple released updates for iOS 15.7.7, iOS 16.5.1, iPadOS 15.7.7, iPadOS 16.5.1, macOS Big Sur 11.7.8, macOS Monterey 12.6.7, macOS Ventura 13.4.1, Rapid Security Responses for iOS 16.5.1, Rapid Security Responses for iPadOS 16.5.1, Rapid Security Responses for macOS Ventura 13.4.1, Safari 16.5.1, Safari 16.5.2, watchOS 8.8.1, and watchOS 9.5.2. This includes security updates. Use Apple Software Update to install these updates. A reboot is required.

iOS 15.7.7 and 16.5.1 are security updates. Use Settings, General, Software Update to install the most current update.

iPadOS 15.7.7 and 16.5.1 are security updates. Use Settings, General, Software Update to install the most current update.

watchOS 8.8.1 and 9.5.2 are security updates. Use the Watch app on your iPhone to install the most current version.

Don’t forget to check your mobile devices, too! Many updates will also apply to your tablet, phone, kindle or television – so check your device-appropriate App Store and install updates.

Important Notes

Everything above this section should be checked by everyone on every computer. Chances are good that close to every single computer you touch will be affected by those updates. This is not the case with the items below, though you should still check each line item below to see if it applies to software you have installed.

The release of macOS Ventura (13.x) means that macOS Catalina (10.15) and older are no longer supported. If you can not install at least macOS Big Sur (11) on your Mac then you should immediately remove it from the Internet and use it offline only. It will no longer receive patches or updates and can now no longer be secured.

The now-current — and final — release of the Windows 10 (v22H2) is very large so will take a long time to download on slower connections. All non-LTS versions of Windows 10 other than v22H2 are now out of support, upgrade to v22H2 now. If you aren’t sure whether you are using LTS, you aren’t. If you don’t let it finish and you’re on a slow connection, this process will kill your Internet performance forever. If you don’t have the bandwidth to download the bits, I’m happy to provide loaner USB drives to our local clients, or, if you prefer to have me mail it to you please contact me for information.

The now-current release of the Windows 11 (v22H2) is very large so will take a long time to download on slower connections. Windows 11 pushes you to get the latest Windows 11 release every 12 months and only supports any consumer builds for 24 months. If you don’t let it finish and you’re on a slow connection, this process will kill your Internet performance forever. If you don’t have the bandwidth to download the bits, I’m happy to provide loaner USB drives to our local clients, or, if you prefer to have me mail it to you please contact me for information.

Windows 11 is now stable and can be upgraded to if your hardware supports it, but I recommend you continue to use Windows 10 until early 2025 before you consider switching to it.

Please remember that while I list many different applications within these updates, most people should ONLY install updates for a program if they already have a previous version of that program installed.

It is essential to maintain all the applications you have installed on your computer, but often you can minimize the time investment and the potential for exploitation simply by uninstalling software you do not need or use, reducing the attack surface. This includes “free” applications like Avast, OpenOffice, and games you do not actually play.

Also note that using the applications own “check for updates” function, when available, will best preserve your current settings, and often avoid any crapware that might come with a fresh installer. Use this option if it’s available to you.

Finally, if you’re sick of doing this all yourself, let me! Call or email me any time, and we can set you up with subscription SaferPC updates which will be installed each month whenever necessary. Click, call or email for more details:
https://saferpc.info/updates/
209-565-12PD
shawn@12pointdesign.com

Driver Updates

If you’re using this hardware – these updates are for you.

AMD Adrenalin 23.7.1 resolves several bugs and improves compatibility. This is not a security update.
https://www.amd.com/en/support

Crucial Storage Executive 9.04 doesn’t provide a changelog so should be treated as a security update.
https://www.crucial.com/support/storage-executive

DS4Windows 3.2.12 resolves several bugs. This is not a security update.
https://github.com/Ryochan7/DS4Windows/releases/latest

Garmin Express 7.17.3 doesn’t provide a changelog so should be treated as a security update.
https://www.garmin.com/en-US/software/express/

Nvidia Driver 474.44 is a security update.
https://www.nvidia.com/Download/index.aspx?lang=en-us

Xerox Smart Start 1.9.12.0 doesn’t provide a changelog so should be treated as a security update.
https://www.support.xerox.com/en-us/content/143617

Browser Updates

One or more of these are likely to be of interest to everyone.

Brave 1.52.130 is a security update.
https://brave.com/

Google Chrome 114.0.5735.198 is a security update.
https://www.google.com/chrome/

Microsoft Edge 114.0.1823.79 is a security update.
https://www.microsoft.com/en-us/edge/business/download

Firefox 115.0.2 is a security update.
https://www.mozilla.org/en-US/firefox/new/

Firefox ESR 115.0.2 is a security update.
https://www.mozilla.org/en-US/firefox/organizations/all/

Vivaldi 6.1.3035.84 is a security update.
https://vivaldi.com/

Microsoft Edge WebView2 114.0.1823.79 is a security update.
https://developer.microsoft.com/en-us/microsoft-edge/webview2/

Email Updates

One or more of these are likely to be of interest to everyone.

Spark 3.6.5.51733 resolves several bugs and improves mail collections. This is not a security update.
https://sparkmailapp.com/

Spark (macOS) 3.6.5.51732 resolves several bugs and improves mail collections. This is not a security update.
https://sparkmailapp.com/

Thunderbird 102.13.0 is a security update.
https://www.thunderbird.net/en-US/

Internet Updates

One or more of these are likely to be of interest to everyone.

Dropbox 177.4.5399 resolves a reliability bug. This is not a security update.
https://www.dropbox.com/

Facebook Messenger 190.0.0.9.106 is a security update.
https://www.messenger.com/download

FileZilla Client 3.65.0 updates libraries and resolves several bugs. This should be treated as a security update.
https://filezilla-project.org/

FreeFileSync 12.4 resolves several bugs. This is not a security update.
https://www.freefilesync.org/download.php

Google Drive 77.0 is a security update.
https://drive.google.com/start

Microsoft Teams 1.6.00.16472 resolves a couple bugs and adds user feedback. This is not a security update.
https://teams.microsoft.com/downloads

Pocketnet-Core 0.21.3 resolves several bugs. This is not a security update.
https://pocketnet.app/

PushBullet 502 doesn’t provide a changelog so should be treated as a security update.
https://www.pushbullet.com/

Rclone 1.63.0 adds several new features and resolves dozens of bugs. This should be treated as a security update.
https://rclone.org/

Signal 6.24.0 adds search to mentions. This is not a security update.
https://signal.org/download/windows/

Signal (Android) 6.24.4 doesn’t provide a changelog so should be treated as a security update.
https://signal.org/android/apk/

Syncthing 1.23.6 resolves several bugs. This is not a security update.
https://syncthing.net/

Technitium DNS Server 11.3 adds new record types and resolves several bugs. This is not a security update.
https://technitium.com/dns/

Telegram 4.8.4 improves stability. This is not a security update.
https://telegram.org/

WinSCP 6.1.1 is a security update.
https://winscp.net/eng/index.php

Zoom 5.15.3.18551 is a security update.
https://zoom.us/

Media Updates

These are unlikely to be of interest to most people.

3tene 3.0.10 resolves a dozen bugs. This is not a security update.
https://en.3tene.com/

Bitwig Studio 5.0 is a major update add over a hundred new features, objects, object controls, and resolves over 20 bugs.
https://www.bitwig.com/download/

darktable 4.4.1 resolves several bugs. This is not a security update.
https://www.darktable.org/

Kodi 20.2 resolves almost 40 bugs. This is not a security update.
https://kodi.tv/

Plex Desktop 1.73.1.3905 improves the Discover feature. This is not a security update.
https://www.plex.tv/media-server-downloads/#plex-app

Plex Home Theater 1.42.0.3898 resolves a couple bugs with Live TV. This is not a security update.
https://www.plex.tv/media-server-downloads/#plex-app

Plex Media Server 1.32.4.7195 resolves several bugs. This is a security update.
https://www.plex.tv/media-server-downloads/#plex-media-server

Game Updates

These are unlikely to be of interest to most people.

GameMaker Studio 2023.6.0.89 resolves over 60 bugs. This is not a security update.
https://www.yoyogames.com/en/gamemaker

GDevelop 5.2.166 enables 3D editing for all users, adds 3D models to the asset store and resolves several bugs. This is not a security update.
https://gdevelop.io/download

Lego Studio 2.23.6.1 resolves several bugs. This is not a security update.
https://www.lego.com/en-us/ldd

Steam 2023.06.14 resolves over a hundred bugs and improves the notification and in-game chat experience. This is not a security update.
https://www.steampowered.com/platform/update_history/index.php?skin=0&id=0

Office Updates

One or more of these are likely to be of interest to most people.

Adobe ColdFusion 2018u17, 2021u7, and 2023u1 are security updates.
https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html

Adobe InDesign 18.4 and 17.4.2 are security updates.
https://helpx.adobe.com/security/products/indesign/apsb23-38.html

Adobe Reader DC 23.003.20244 is a security update.
https://get.adobe.com/reader

Blender 3.6 vastly improves performance and adds several new features, including cache, UI, text and selection improvements, new Simulation abilities and UV improvements. This is not a security update.
https://www.blender.org/download/

Calibre 6.22.0 adds support for new hardware and resolves several bugs. This is not a security update.
https://calibre-ebook.com/

ImageMagick 7.1.1-12 resolves several bugs. This is not a security update.
https://imagemagick.org/

Kdenlive 23.04.2 improves timeline and resolves several bugs. This is not a security update.
https://kdenlive.org/

Notepad++ 8.5.4 resolves over a dozen bugs. This is not a security update.
https://notepad-plus-plus.org/

Paint.net 5.0.7 resolves several bugs. This is a security update.
https://www.getpaint.net/

PDF-XChange Editor 10.0.1.371 is a security update.
https://www.tracker-software.com/product/pdf-xchange-editor

Security Software Updates

One or more of these is likely to be of interest to most people.

Chainsaw 2.7.2 resolves several bugs. This is not a security update.
https://github.com/countercept/chainsaw

HTTP Toolkit 1.12.8 doesn’t provide a changelog so should betreated as a security update.
https://httptoolkit.tech/

Microsoft Edge Policy 2023.07.05 adds new policies.
https://github.com/MicrosoftDocs/Edge-Enterprise/blob/public/edgeenterprise/microsoft-edge-policies.md

PureOS 10.3 improves security and management. THis is a security update.
https://pureos.net/download/

RogueKiller 15.11.0 is a security update.
https://www.adlice.com/download/roguekiller/

Stinger 12.2.0.641 adds several new detections. This is not a security update.
https://www.mcafee.com/us/downloads/free-tools/stinger.aspx

SuperAntiSpyware 10.0.1254 resolves several bugs. This is not a security update.
https://www.superantispyware.com/download.html

Capture Updates

These are unlikely to be of interest to most people.

Camtasia 23.1.0 adds variable speed playback, reflections, and resolves several bugs. This is not a security update.
https://www.techsmith.com/video-editor.html

Open Broadcaster Software 29.1.3 resolves a dozen bugs. This is not a security update.
https://obsproject.com/

ScreenToGif 2.38.1 resolves several bugs. This is not a security update.
https://github.com/NickeManarin/ScreenToGif/releases/latest

Converter Updates

These are unlikely to be of interest to most people.

DVDFab 12.1.1.0 adds support for new encodings. This is not a security update.
https://www.dvdfab.cn/download.htm

IsoBuster 5.2 doesn’t adds support for spanned archives, new file type support, and resolves several bugs. This is not a security update.
https://www.isobuster.com/download.php

StreamFab 6.1.3.0 resolves several bugs. This is not a security update.
https://www.dvdfab.cn/downloader-new.htm

UniFab 1.0.2.4 resolves several bugs. This is not a security update.
https://www.dvdfab.cn/unifab.htm

Utility Updates

These are unlikely to be of interest to most people.

1Password for Mac 8.10.8 vastly improves LastPass import, and resolves several bugs. This is not a security update.
https://1password.com/downloads/mac/

1Password for Windows 8.10.8 vastly improves LastPass import, and resolves several bugs. This is not a security update.
https://1password.com/downloads/windows/

7-Zip 23.01 improves translation details and resolves several bugs. This is not a security update.
https://www.7-zip.org/

Agent Ransack 2022.3405 resolves several bugs. This is not a security update.
https://www.mythicsoft.com/agentransack/download/

Autoruns 14.1 resolves several bugs. This is not a security update.
https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns

Bitwarden 2023.5.1 resolves several bugs. This is not a security update.
https://bitwarden.com/

CCleaner 6.13.10517 resolves several bugs and adds cleanup support for a dozen more applications. This is not a security update.
https://www.ccleaner.com/

Cygwin 3.4.7 resolves several bugs. This is not a security update.
https://cygwin.com/

DesktopOK 10.88 improves compatibility. This is not a security update.
https://www.softwareok.com/?seite=Freeware/DesktopOK

dnGrep 4.0.26.0 switches underlying .NET support to v7, which significantly improves performance. This is not a security update.
https://dngrep.github.io/

ESEDatabaseView 1.73 adds full screen support. This is not a security update.
https://www.nirsoft.net/utils/ese_database_view.html

Etcher 1.18.8 fixes the support link. This is not a security update.
https://www.balena.io/etcher/

FileLocator Pro 2022.3405 resolves several bugs. This is not a security update.
https://www.mythicsoft.com/filelocatorpro/download

Fing 3.4.0 doesn’t provide a detailed changelog so should be treated as a security update.
https://www.fing.com/products/fing-desktop-download-windows

Go 1.20.6 is a security update.
https://go.dev/

Homedale 2.07 adds cosmetic changes for local MAC addresses. This is not a security update.
https://www.the-sz.com/products/homedale/

HWiNFO 7.50 doesn’t provide a detailed changelog so should be treated as a security update.
https://www.hwinfo.com/download/

Kingston SSD Manager 1.5.3.2 doesn’t provide a detailed changelog so should be treated as a security update.
https://www.kingston.com/us/support/technical/ssdmanager

ManageWirelessNetworks 1.12 adds a sort-by toolbar button. This is not a security update.
https://www.nirsoft.net/utils/manage_wireless_networks.html

MobileFileSearch 1.46 adds a sort-by toolbar button. This is not a security update.
https://www.nirsoft.net/utils/mobile_device_file_search.html

MPAM 1.393.60.0 adds support for new detections. This should be treated as a security update.
https://www.microsoft.com/en-us/wdsi/defenderupdates

NetworkTrafficView 2.50 adds support for the sapics geo-IP databases. This is not a security update.
https://www.nirsoft.net/utils/network_traffic_view.html

NTLite 2023.6.9292 resolves several bugs. This is not a security update.
https://www.ntlite.com/download/

OSForensics 10.0.1014 adds new filesto detection. This is not a security update.
https://www.osforensics.com/download.html

AOMEI Partition Assistant 10.1.0 adds interactive UEFI BIOS import and export support. This is not a security update.
https://www.diskpart.com/

PowerToys 0.71.0 resolves several bugs. This should be treated as a security update.
https://github.com/microsoft/PowerToys/releases/latest

ProcessMonitor 3.95 resolves a crash bug. This is not a security update.
https://docs.microsoft.com/en-us/sysinternals/downloads/procmon

RoboForm 9.4.9 resolves several bugs. This is not a security update.
https://www.roboform.com/

ScreenConnect 23.5.5.8587 resolves dozens of bugs. This is not a security update.
https://www.connectwise.com/software/control/download

SimpleWMIView 1.55 resolves a bug. This is not a security update.
https://www.nirsoft.net/utils/simple_wmi_view.html

Sysmon 15.0 is a security update.
https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon

TaskSchedulerView 1.73 adds a sort-by button to the toolbar and resolves a cosmetic bug. This is not a security update.
https://www.nirsoft.net/utils/task_scheduler_view.html

Unity 2023.1.3 resolves dozens of bugs. This is not a security update.
https://unity3d.com/get-unity/download/archive

Ventoy 1.0.93 improves compatibility and resolves several bugs. This is not a security update.
https://www.ventoy.net/en/index.html

WinGet 1.5.1881 resolves a couple bugs. This is not a security update.
https://github.com/microsoft/winget-cli/releases/latest

ZoomText 2023 2023.2306.21.400 resolves several bugs. This is not a security update.
https://support.freedomscientific.com/Downloads/ZoomText

Developer Updates

These are unlikely to be of interest to most people.

GitHub Desktop 3.2.6 resolves a dozen bugs. This is not a security update.
https://desktop.github.com/

Godot 4.1 resolves dozens of bugs and adds several new features. This is not a security update.
https://godotengine.org/

GitHub includefragment 6.3.0 adds a customelements manifest. This is not a security update.
https://github.github.io/include-fragment-element/

Node.js 20.4.0 resolves dozens of bugs. This is a security update.
https://nodejs.org/en/

Node.js 16.20.1 is a security update.
https://nodejs.org/en/

Node.js 18.16.1 is a security update.
https://nodejs.org/en/

Redemption 6.4.0.6234 adds several new features and resolves a dozen bugs. This is not a security update.
https://www.dimastr.com/redemption/

Visual Studio Code 1.80 resolves several bugs. This is not a security update.
https://code.visualstudio.com/

Web Package Updates

These are likely to be of interest only to web developers.

Invision Community 4.7.11.1 is a security update.
https://invisioncommunity.com/

Drupal 9.5.10 improves compatibility. This is not a security update.
https://drupal.org/download

Joomla 4.3.3 resolves dozens of bugs. This is not a security update.
https://www.joomla.org/

OpenCart 4.0.2.2 resolves over a dozen bugs. This is not a security update.
https://www.opencart.com/

ownCloud Client 4.1.0.11250 resolves a dozen bugs. This is not a security update.
https://owncloud.com/desktop-app/

Piwigo 13.8.0 is a security update.
https://piwigo.org/

Akismet 5.2 resolves several bugs. This is not a security update.
https://wordpress.org/extend/plugins/akismet/

Autoptimize 3.1.8.1 is a security update.
https://wordpress.org/extend/plugins/autoptimize/

Duplicator 1.5.5 resolves a dozen bugs. This is not a security update.
https://wordpress.org/plugins/duplicator/

myStickymenu 2.6.4 resolves several bugs. This is not a security update.
https://wordpress.org/extend/plugins/mystickymenu/

W3 Total Cache 2.3.3 resolves several bugs. This is not a security update.
https://wordpress.org/extend/plugins/w3-total-cache/

Widgets on Pages 1.8.1 resolves a compatibility bug. This is not a security update.
https://wordpress.org/extend/plugins/widgets-on-pages/

WooCommerce 7.8.2 resolves several bugs. This is not a security update.
https://wordpress.org/extend/plugins/woocommerce/

That’s all for now folks. Keep it clean out there. 😉

Regards,

Shawn K. Hall
https://SaferPC.info/
https://12PointDesign.com/

 

Flash Begone!

Adobe Flash: You Will Not Be Missed

Flash is going to be going away in about a month. Adobe announced the end-of-life (EOL) for Flash about two and a half years ago. Microsoft will be removing the built-in Windows version in 40 days. Flash is currently built into chromium-based browsers (Chrome, Edge, Brave, Vivaldi and so on), and will no longer be included at all in a couple weeks, and the only other browser that has supported it (Firefox) will block it in late December. By mid-January no browser will support Flash and any website that relies on it will have major compatibility problems. Facebook game players have been terrified of this because it’s going to finally kill Farmville.

HTML5 is the replacement for Flash. Flash is closed-source and historically extremely insecure – directly responsible for over half of all malware infections. Flash was originally designed by Macromedia which was later bought by Adobe. Adobe’s entire system has always been designed around closed-source and limiting access to how their software works, which means that it doesn’t have the ability for outside code review or security analysis. HTML5, on the other hand, is open-source, designed by the same people that designed the Internet itself. It does have a digital rights management (DRM) stub which allows publishers to prevent data from being copied (like Netflix), but it’s nowhere near as closed as Flash has been.

Those few sites that lament the loss of Flash don’t understand the risks and troubles that we’ve all experienced as a direct result of this uniquely horrific technology. There are over 1,000 known vulnerabilities in Adobe Flash. At 24 years old, that’s an average of 42 vulnerabilities per year or 3.5 per month. At the time of publication, 652 of the vulnerabilities score a “perfect 10” on the CVS risk scale, and 894 vulnerabilities score 9.0 and above. Put simply, 90% of the known vulnerabilities in Adobe Flash are considered Critical and are capable of completely taking over the affected device.

If you don’t want to wait, you can eliminate Flash yourself using the Adobe Flash Removal Tool.

That’s all for now folks. Keep it clean out there. 😉

Regards,

Shawn K. Hall
https://SaferPC.info/
https://12PointDesign.com/

Do Not Reuse Passwords

Password security is a growing field and the old conventional wisdom of using a “strong” password and changing it frequently has lead to people using the same “strong” password on many different websites, resulting in their complete identity being hijacked when any one of those sites is compromised.

HaveIBeenPwned (HIBP) is a service that collects data dumps from when websites are hacked and uses the data to provide a service to alert users whenever their accounts are compromised. It’s like a central clearinghouse for account monitoring. Unfortunately, by the time accounts are listed in HIBP it is often years after the account has been hacked and the hackers that originally took the account information have had that entire period to make use of your account details. Many websites store their passwords in plain text, and many of the others that do use password hashing algorithms to store only a mathematical representation of the password and not the password itself neglect to use properly salted hashes, which means that those hashed passwords can often be compared with rainbow tables to effectively convert them to their plain text equivalent. Seeing the passwords that people – still today – continue to use is destroying my hope in humanity. For example, “123456” is used by almost 1% of business professionals for their online social interactions. Dead serious.

The trends on these exposed passwords show that there are very common patterns and weak password consideration is the rule of the day. Few people, and by few I mean I could probably count them on one hand, actually do passwords right. It’s time to take your own security seriously, because the evidence shows that many of those you do business with do not.

Here’s the Problem

Weak passwords you’ve used on service x (Yahoo, for example) will be dumped along with all the other passwords on that hacked service. Those same weak passwords will be tested on service y and service z. And everywhere else. This process is called “password stuffing.”

If you reuse even part of your passwords then you open yourself up to being targeted either randomly or by evil people you may already know. “Script kiddies” live and die by their ability to make an example out of people who they feel have done them harm. You could also become the victim of automated scanners that consume the usernames and passwords from these dumps then try them on every known system from Facebook to Gmail to email to banking services. The passwords will be munged in order to test similar or stylistically equivalent passwords. For example, of the LinkedIn hack, almost 2.5 million accounts (or about 1.5%) used some variant of the site name in their password. Those same accounts probably use some variation of the site name in most of their passwords. This can safely be assumed to be done everywhere, meaning that if you use “linkedin123456” for LinkedIn, there’s a good chance that your Facebook password is “facebook123456”.

So when over a million people used “123456” as their LinkedIn password, not only did it expose that as a very commonly used password, but it demonstrated that those million-plus email addresses tied to those weak passwords were used by people that didn’t take security seriously. If you use a weak password anywhere, chances are good that you use weak passwords elsewhere, if not everywhere. If something as quick and easy as changing a password isn’t done, then you also probably neglect your hardware and software. You’re using older and insecure programs. You’re exposing all of yourself with a single simple decision that you think will make your life easier.

It doesn’t. Reusing even part of a password only makes life easier for whoever attacks you. They can stay in their momma’s basement and spend all day throwing your account details at different sites until they get in. When they do, it doesn’t hurt them, it hurts you. Two or three hijacked accounts, or variations on your passwords from multiple dumps show how you think, and the style and scope of password complexity you use.

Again referring to the 2012 LinkedIn hack, there were over 26,000 variations of passwords that included “12” or “2012” in the password. From this we can imply that users will seed their passwords with the year they changed it. The same accounts are probably still using the same patterns with “2019” or “2020” today.

“Different” !== Strong

Usually these dumps are sold on the black market or used by the original hacker for a while before they’re inevitably released publicly. The data is out there so it’s necessary to use defensive passwords.

You can’t just change a number at the end of your password and possibly think that it’s going to make a difference in your security. The delay it might impose against an organized attacker is less than a single second. You can’t create a strong password by typing random characters on your keyboard. You just can’t. The predictive value of muscle memory, social and cognitive signals, and even keyboard bias result in a relatively small set of potential values for manually-generated passwords.

1337-sp34k offers no additional protection.

Using a strong password is no longer a suggestion. To be secure in the current world you must use a strong, unique, randomly-generated password for any and all sites and services. Failing to do so will result in that password being used as the seed to corrupt your digital life later on. Maybe not today, maybe not tomorrow, but soon, and for the rest of eternity.

The rules used to be pretty simple, but were still never observed:

  • DO NOT use a series of numbers and a word or two. (123badpassword)
  • DO NOT use a word or two and a series of numbers. (badpassword123)
  • DO NOT use a word with numbers breaking it up. (1bad2password3)
  • DO NOT use the site name or URL as any part of the password. (mylinkedinpassword)
  • DO NOT use keyboard sequences like “qwerty” or “123456”.
  • DO NOT use any word or name related to you or your life (pets, family, friends, musicians).
  • DO NOT use dates or other simple patterns.

Unfortunately, these rules are still ignored, and even if they were followed to a T, these rules are no longer sufficient for creating a passwords or passphrases manually. Today, any password you can remember is not a good password. It’s time you put the effort into proper password management.

Fortunately, the new rules are actually simpler:

But my browser remembers my passwords!

All modern browsers (Chrome, Firefox, Edge, Safari) have password management built-in. You can use that in order to generate strong passwords and, while short, they’ll be unique for each site. Unfortunately, since these passwords are stored in the browser they can be extracted by any malicious software that manages to make it onto the device or compromise your browser Sync account, where password managers generally use much stronger encryption.

Websites are still catching up to the reality of password managers

Long passwords, 300 characters or more, are not a problem for your password manager, but they’re probably a problem for the site. BofA limits your password to 20 characters. Yahoo limits your password to 128 characters. Facebook allows much longer passwords, but only requires 6 characters and character case isn’t treated as significant so entropy is significantly reduced, especially for shorter passwords.

Some websites and app logins don’t allow you to copy & paste in the password field which means that they often don’t play well with password managers. Others (like AT&T and Yahoo) refuse to allow certain characters in passwords, so randomly generated passwords have to be manually munged instead of allowing them to be truly random.

Nevertheless, failing to use a password manager means that you’re not using random passwords at all, and are likely reusing passwords to your own peril.

The solution is to get a password manager now and immediately start working to migrate your accounts to it. Almost every password manager today offers password analysis to warn you of weak, reused, and known compromised passwords so you can prioritize changing the passwords for those accounts.

What’s your favorite password manager?

Conventional Wisdom on Solid-State Drives

Every time I post about solid-state drive’s (SSDs) there’s always a nay-sayer warning about their “short life” and limited usability. It’s a huge misunderstanding of SSD wear-leveling and endurance to assume that a thousand program/erase (PE) cycles somehow implies that the drive is of less persistent value than a conventional drive. This is wildly inaccurate.

The Old Way

Conventional drives store their information on revolving platters and use magnetic arms to read and assign magnetism to specific locations on each platter. The arms are fragile. The movement of the platters is subject to environmental forces. A drop of only a fraction of an inch can toast your conventional drive. An hour in the car in front of Starbucks or the moisture that makes it through your laptop bag when walking between classes in the rain can kill it. Some are even faulty by design (planned obsolescence) or even if they’re not, can suffer from a random failure at any point in their life from dust or exposure to magnetism or even sunlight. This is the fatal flaw with moving parts. In any entropic system stuff will inevitably go wrong. The endurance you hope for is that gamble that it either won’t be you, or at least it won’t be now.

There have been dozens of studies of both conventional and solid-state drives. Most studies on conventional drives essentially conclude that some are better than others, but that they will all fail randomly at some point. Unfortunately, when it comes to conventional drives there’s really no guaranteed way to know how long your specific drive is going to last.

Even with the best SMART data you can never really plan for when the conventional drive is going to fail. You can look at the brand or model and estimate in months or years, but actual operational time will vary even between devices from the same factory made at the same time in the same room. You just can’t plan for it.

New Tricks

Solid-state drives, however, do not suffer from the randomness of not being able to know for sure if the drive will even survive it’s first year. Due to their lack of vulnerable moving parts, vastly improved tolerances and predictable wear-leveling values, they have a calculable life that can not only be guessed, but very effectively planned and measured. You can pro-actively track with the drive’s own self-diagnostics in order to identify, if not the very hour, at least the week that your SSD will no longer be able to be written to (the data will usually still be readable).

SSDs provide several measures of their PE values to determine drive longevity. TBW and DWPD are basically different faces of the same number of writes before the drive will begin to fail. This can be measured in hours or bytes, but the meaning is consistent between presentations: if each block can be written 1100 times (which is a pretty close approximation based on current market values) then a 250GB drive could have 275TB written to it during its reliable life. A 960GB drive would be able to have just over 1PB (petabyte) written during its reliable life. If you measure the actual writes to your current drive over a couple months (with PerfMon or SMART) you can see exactly how long it would take you to consume that amount. The drive won’t exactly crash and burn on that day, it will just fall out of the vendor-tested effectiveness in a “how many licks does it take to get to the center of a Tootsie Pop” way. Many SSDs will safely write twice as much data or more. You know, as long as you don’t bite into it. 😉

SMART

Every drive for the last 20+ years has supported some level of self diagnostics (SMART), but the detail provided by SSDs is fantastic. SMART provides potentially hundreds of flags to identify, track, and observe various drive usage and diagnostic information. SSDs provide self-diagnostics through SMART that enables you to see their actual writes, reads, and life. Get an SSD and use it a couple months, and you can effectively estimate its life for your actual usage.

For example, my current C: is a 240GB Kingston SSD. As of the writing of this article the drive has been in use for 937 days (2.57 years), and has only been restarted 72 times (roughly twice per month – usually for software updates or installation). It’s written 18,925 GB (<19 TB) in that time, which is about 20.2 GB/day. With the magic 1100 PE number we can safely assume it’ll be able to write about 264 TB in its life. This means that this drive will likely survive another 33 years at my current usage. Give or take.

Now it should be noted that I’m not the typical person, and I do tune the crap out of my hardware (and the hardware of my clients) to ensure we get both the best experience and the best value out of our hardware. I’m not a gamer, but I run more varied applications and services than anyone I know, keeping a lot in RAM and minimizing page file usage to prevent unnecessary writes. This is to say that the typical person with a stock install may only get a “mere” ten to fifteen years out of similar SSD – for a computer where most of the rest of the hardware will be unsupported in 10 years. Task-based users (email + web + Word) could get centuries out of it if tuned properly. Hardcore gamers may only get a couple years, but they will be fantastic years.

I love the performance of my SSD, but believe me when I say I hope I am not still using this drive as my C: drive in 30 years. New developments are made every year and I plan to offload this one into one of my workhorses when I upgrade my primary rig. 🙂

True Wisdom

Should everyone use an SSD as their operating system drive? Yes. Should it be used for everything? No. You wouldn’t haul manure in a Porsche 911, would you?

I use SSDs in all my computers, but for some tasks I use conventional drives as well. I even use a few drives I know are defective but that have great caching capabilities. For example, I do a lot of video transcoding – converting and resampling video to improve quality and performance. This can write as much as 2 terabytes per day on one of my machines. That would kill my Kingston SSD in just over 4 months, so for these I use cheap conventional drives that are disposed of when they inevitably fail. The SSD runs the apps, but the conventional drive acts as a read/write canvas for transcoding. It works very well. But why don’t I just use an SSD anyway – they’re faster, right? Because the performance for video transcoding with FFMPEG is capped at the speed of the CPU anyway, so it’s never going to be bottlenecking at a disk read or write operation on a conventional drive, making use of an SSD a waste of valuable resources.

The choice is yours, of course, but don’t base your decision on whether to buy a solid-state drive on uneducated FUD.

Regards,

Shawn K. Hall
https://SaferPC.info/
https://12PointDesign.com/

New Year, New Fears: Meltdown and Spectre

Happy New Year!

By now you’ve heard about Meltdown and Spectre, the two new CPU vulnerabilities that are getting 24/7 airtime on every news channel.

This is going to really hurt Intel, as it essentially means that a 2 GHz processor is going to effectively run at 1.4 GHz after it’s patched. A 4 GHz processor is going to effectively run at 2.8 GHz. That’s the kind of performance hit that hard-core gamers and industry professionals are waking up to today, and will encourage many to consider alternative CPUs in the future. Unfortunately, while the one issue (Meltdown) only applies to Intel CPUs the other one (Spectre) affects almost every CPU that has been tested.

Meltdown and Spectre are two separate design flaws in the CPUs that mismanage how access to memory handles are controlled. Older hardware and operating systems will never be patched to address these vulnerabilities, and the patches that are currently being pushed for the Intel (Meltdown) flaw have a very high failure rate (as much as 20% for some hardware) often resulting in unbootable devices. My advice is to wait a few days for other people to be the guinea pigs, then install the updates after you get the all clear.

Neither of these affects only Windows. The vulnerabilities are hardware-based, but the current workarounds for them are being pushed into the operating systems to prevent them from being abused.

Meltdown affects every Intel CPU available today, which means that while many Windows computers are affected, every supported Mac is impacted (they’re all using Intel CPUs), and phones and other devices that use Intel chips are vulnerable as well.

Spectre affects just about everything. If your vendor isn’t supporting the device anymore, it will never be patched and the device can never be secured. Every computer hosting every website is affected. Every server. Every phone, tablet, desktop and laptop in the world is affected by at least one of these vulnerabilities. It seems that the only devices immune are certain security devices (dongles) or devices with very limited capabilities. If it can run software, it’s vulnerable.

If you’re a stock market enthusiast this is a good time to invest in mobile hardware vendors – wait a week or so for people to start bailing out in fear and the price to drop. Then buy their ignorance and in a year you’ll be thanking me. There may not be an immediate return, but as chips are released in the next 8-18 months that resolve these problems, security-minded companies and governments will be buying in bulk to replace every single device they currently employ. Talk about a huge surge in purchases later this year. 🙂

I don’t put a lot of stock in what anyone from the government says, so I will defer to the Intel VP who says that the “unfixable” Spectre flaw can be resolved with a firmware update on most supported devices. I assume the same is true for other vendor chips affected by Spectre. Unfortunately, this means it’s still going to be a long-tail fix, since firmware updates can take months to be released for each supported chip and years to be fully addressed, and unsupported hardware will never be fixed. The Intel SA-00086 vulnerability (initially reported in February 2017), for example, which impacts the last 4 full generations of Intel CPUs still has not received patches for most currently supported hardware. Likewise, it’s quite unlikely that Spectre will be fully addressed on existing supported hardware within the next couple years.

Replacing your device isn’t a solution, either, since hardware that isn’t vulnerable simply doesn’t exist yet. We need to hope that operating system vendors will correctly and fully address these problems on current hardware in the very near future.

Now for the good news

If you’re maintaining your devices – installing operating system, application and driver updates, and you’re removing outdated and unused software, and you’re not installing untrusted third party applications that are either unmaintainable or unsecureable, and you have not been installing “bad” programs (warez, fake, or malicious) – then your computer is really at no greater risk today than it was last week. Both of these vulnerabilities require an evil application to be run on your device to be exploited. They are not remote exploits that automatically bypass the other security precautions you may have in place (unlike SA-00086). Remove everything you don’t want or need on your device, don’t install untrusted apps, don’t ever click “yes” in a popup without reading it and understanding the implications, and you’ll probably be OK. Really.

For anyone else that’s not already using my service: If you don’t want to do this all by yourself – let me.