Patch Watch

Patch Watch: July’s Releases Fix June’s Issues

Included in the July 2017 cumulative update are several fixes precipitated by last month’s June updates. The 1703 release of KB4025342 includes the following fixes: It addresses an issue introduced by KB4022716 where Internet Explorer 11 may close unexpectedly when you visit some websites – this issue introduced by June’s security updates. It addresses an issue to improve MediaCreationTool.exe support for Setup Tourniquet scenarios. It addresses an issue with CoreMessaging.dll that may cause 32-bit apps to crash on the 64-bit version of the Windows OS. It addresses an an issue where Visual Studio or a WPF application may terminate unexpectedly (stops responding, followed by a crash) when running on a pen and/or touch enabled machine with Windows 10 Creators Update. It addresses an issue that causes the system to crash when certain USB devices are unplugged while the system is asleep. It addresses an issues with screen orientation that stops working after lid close and lid open transitions. It addresses an issue that causes .jpx and .jbig2 images to stop rendering in PDF files. It addresses an issue where users could not elevate to Administrator through the User Account Control (UAC) dialog when using a smart card. It addresses an issue where input using … Read More »

What To Do If You’ve Been Hacked

NOTE: For the second time in two months, Windows users are susceptible to a global malware attack. To protect yourself against this one, called Petya, I recommend reviewing my articles “What You Need to Know to Protect Yourself from Ransomware” and “When You Should Disable Server Message Block v1.” Signs You’ve Been Hacked It’s either easy or hard to determine if you’ve been hacked. In the case of ransomware, it’s extremely easy to know when you’ve been hacked: You get a request for money. However, the goal of most of the best hackers is to leave you blissfully ignorant of any wrongdoing. This way, your machine and your network access remains a resource for them to exploit. For example, the NSA tools that were recently released to the public were designed to allow for silent access to a system. The exploits released back in April have been patched by Microsoft, but they point out the goal of these nation-state attackers is to be stealthy and covert. So then if the goal of these tools are to be silent, how can you then know when you have been attacked? This is often the hardest of all – often you only know if … Read More »