Tag Archives: patched

A Must Have Security Application – Secunia PSI 3.0 Final Release

imageI’ve long made it a practice to treat my Windows machines as if they have already been compromised. No, that’s not paranoia – that’s 30+ years of practical hands on computing experience.

If there’s one thing that experience has taught me it’s this – I don’t know what I don’t know. More particularly – I don’t know if any/some/all of the applications (including the operating system), I run on these machines have critical security vulnerabilities that I’m unaware of. And, yet to be discovered critical security vulnerabilities have been, and continue to be, a constant.

A recent example:

The Flame virus went undetected for two years by every online security firm.

Just today:

Chrome 20 fixes 20 security vulnerabilities

Winamp 5.63 fixes four critical security vulnerabilities

Old advice (beating a dead horse advice) –

“Keep all applications (including your operating system) patched, and up to date. Taking this simply step, reduces the likelihood that malware will become an issue a user will have to deal with – significantly. Cybercriminals use vulnerabilities in applications as entry points and gateways to compromise computers which can give access to confidential data such as passwords, online profiles, and bank details. Attacks exploiting vulnerable programs and plug-ins are often not blocked by traditional anti-virus applications.”

Sounds like good, practical advice – and it is. But as those of us involved in computer security know; this is advice that is not always followed. Some hold the view (including me), that it is rarely followed.

One particular application that I have reviewed and recommended a number of times – that assists users in keeping a system fully patched is – Secunia Personal Software Inspector (PSI) – which constantly monitors a system for insecure software installations.

Secunia is justifiably proud of the fact that there are currently 5 Million users running this free protection application – but, from a personal perspective, I’m shocked at this low number. It should be 500 Million users! What is wrong with people that they fail to understand the advantages of ensuring that their system/applications are patched and up to date?

There’s less reason now, than ever, to disregard the critical advice offered above. Today, Secunia launched version 3 of its free Personal Software Inspector (PSI), with a host of new features.

PSI 3 with its dramatically simplified user interface and intuitive preferences, takes the burden out of updating and patching – and, most importantly, helps users safeguard their computer, and data, against cybercriminals.

The new version makes patching software more comprehensive, automatic, and easier than ever. How simple is that?

How simple is it? The following screen captures illustrate.

On program launch a simple click on “Please run a scan” gets things moving.

image

A full scan takes no more than a few minutes.

image

In this test, PSI picked up one application that needed updating. You might think that VLC (VideoLAN), would be relatively safe from being manipulated by cyber criminals. Unfortunately, you’d be wrong.

In July of last year VLC, when downloaded from other than the developer’s website, came bundled with malware. A reminder as to why it’s so important to download from the developer’s site, or a recognized download service.

image

PSI automatically, and in the background, downloaded (from the official site) and installed the most recent version of VLC – raising the machine’s score from 98% to 100%.

image

Fast facts:

Simple User Interface – Dramatically simplified user interface displays the key information that users need to know: scan results, the security status of installed software, and when these programs are up-to-date.

Automatic Patching – With the Secunia PSI 3.0, users receive automatic updates for all software supported by the application. Previously Secunia only provided automatic updates for vendors that made automatic updates available.

Localization – The Secunia PSI 3.0 can be installed in any one of five languages including French, Spanish, German, Danish and English.

Program Ignore Rules – Users have the ability to ignore updates to a particular program by creating ignore rules. This can, for example, be relevant if a user has an application that depends on an older version of another program or plug-in. Users may reverse this selection at any time. Users also have the ability to view the file location and version number of an installed program.

History – Reports about the updates installed and scans conducted can be accessed at any time through the history feature.

Share – A new share link allows users to post a link on Facebook or Twitter feeds, making it easy for friends to try out the Secunia PSI 3.0.

Settings – The settings menu allows users to select whether or not to install updates automatically, and which drives are to be scanned.

System requirements: Windows 7, Vista SP 1 or later, XP – SP 3 (32 bit and 64 bit).

Available languages:

DanishEnglishFrenchGermanSpanish

Download at: Secunia

Secunia PSI 3.0, by installing the latest security updates that a vendor of an application has released, offers a real solution which helps users avoid becoming a victim of a hacker exploiting vulnerabilities in installed software. Installing this free application should be a no-brainer.

For all the critical “yeah, but” experts who troll the Internet – it’s undoubtedly true that no security application is perfect. However, used properly, PSI 3 adds another layer of effective security.

17 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Don't Get Hacked, downloads, Freeware, Secunia, System Utilities

FireFox Full of Critical Security Holes – Update to Version 3.0.4 Now!

Mozilla has just released FireFox 3.0.4 which fixes eleven security issues discovered in FireFox version 3.0.3.

These issues run from high (critical), to moderate, and include the risk of illegal code execution, the possibility of personal information being exposed, and denial-of-service attacks.

If you haven’t already updated to version 3.0.4, it is critical that you do so now to ensure the integrity of your computer and to safeguard your personal and financial information.

The following are the vulnerabilities involved and the risk attached to each as per the Mozilla web site.

Critical vulnerabilities patched:

– MFSA 2008-55 Crash and remote code execution in nsFrameManager. A vulnerability in part of Mozilla’s DOM constructing code can be exploited by modifying certain properties of a file input element before it has finished initializing. When the blur method of the modified input element is called, uninitialized memory is accessed by the browser, resulting in a crash. This crash may be used by an attacker to run arbitrary code on a victim’s computer.

– MFSA 2008-54 Buffer overflow in http-index-format parser. This is a flaw in the way Mozilla parses the http-index-format MIME type. By sending a specially crafted 200 header line in the HTTP index response, an attacker can cause the browser to crash and run arbitrary code on the victim’s computer.

– MFSA 2008-53 XSS and JavaScript privilege escalation via session restore. The browser’s session restore feature can be used to violate the same-origin policy and run JavaScript in the context of another site. Any otherwise unexploitable crash can be used to force the user into the session restore state. This vulnerability could also be used by an attacker to run arbitrary JavaScript with chrome privileges.

– MFSA 2008-52 Crashes with evidence of memory corruption. Mozilla developers identified and fixed several stability bugs in the browser engine used in FireFox and other Mozilla-based products. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

Two vulnerabilities rated as a high security risk have been patched:

MFSA 2008-57 -moz-binding property bypasses security checks on codebase principals

MFSA 2008-56 nsXMLHttpRequest::NotifyEventListeners() same-origin violation

The following vulnerabilities rated as a moderate security risk have also been patched:

MFSA 2008-51 file: URIs inherit chrome privileges when opened from chrome

MFSA 2008-47 Information stealing via local shortcut files

MFSA 2008-58 Parsing error in E4X default namespace

4 Comments

Filed under Browsers, Don't Get Hacked, Firefox, Freeware, Interconnectivity, Internet Safety, Internet Safety Tools, Malware Advisories, Online Safety, Safe Surfing, Software, Spyware - Adware Protection, System Security, Windows Tips and Tools