macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password

A bug report submitted on Open Radar this week reveals a security vulnerability in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. From a report: MacRumors is able to reproduce the issue on macOS High Sierra version 10.13.2, the latest public release of the operating system, on an administrator-level account by following these steps: 1. Click on System Preferences. 2. Click on App Store. 3. Click on the padlock icon to lock it if necessary. 4. Click on the padlock icon again. 5. Enter your username and any password. 6. Click Unlock. As mentioned in the radar, System Preferences does not accept an incorrect password with a non-administrator account. We also weren’t able to unlock any other System Preferences menus with an incorrect password. We’re unable to reproduce the issue on the third or fourth betas of macOS High Sierra 10.13.3, suggesting Apple has fixed the security vulnerability in the upcoming release. However, the update currently remains in testing. Read more of this story at Slashdot.

More:
macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password

Meltdown and Spectre CPU flaws threaten PCs, phones and servers

By now you’ve probably heard about a bug Intel is dealing with that affects processors built since 1995. But according to the people who found “Meltdown” and “Spectre, ” the errors behind these exploits can let someone swipe data running in other apps on devices using hardware from Intel, ARM and AMD. While server operators ( like Amazon ) apply Linux patches to keep people from accessing someone else’s information that’s being executed on the same system, what does this mean for your home computer or phone? Google’s Project Zero researchers identified the problems last year, and according to its blog post, execution is “difficult and limited” on the majority of Android devices. A list of potentially impacted services and hardware is available here , while additional protection has been added in the latest Android security update . In a statement, Microsoft said: “We are in the process of deploying mitigations to cloud services and have also released security updates to protect Windows customers against vulnerabilities affecting supported hardware chips from Intel, ARM, and AMD.” In a blog post directed towards customers on its Azure server platform, the company said its infrastructure has already been updated, and that a “majority” of customers should not see a performance impact. Apple has not publicly commented on the issue, however security researcher Alex Ionescu points out that macOS 10.13.2 addresses the issue and said that the 10.13.3 update will include “surprises.” According to AMD, “Due to differences in AMD’s architecture, we believe there is a near zero risk to AMD processors at this time, ” however it has promised further updates as the information comes out. As for ARM, it says most processors are unaffected but it has specific information on the types that are available here . So what does this mean for you? On your devices the prescription is the same as always — make sure you have the latest security updates installed and try to avoid malware-laden downloads from suspicious or unknown sources. Source: MeltdownAttack.com

Read More:
Meltdown and Spectre CPU flaws threaten PCs, phones and servers

MediaPortal 1.19.0 Pre Release

We from Team-MediaPortal wish everyone a safe and happy 2018!  To celebrate the new year we have just released a Pre Release of MediaPortal 1.19.0 . Happy testing! Pre Releases are provided as a way for the community to test and give feedback on all the exciting things we have lined up for the next release. We allocate about one month for Pre Release testing. In that time we will only fix bugs, after which comes the final release! Highlights of this release  Bugfixes: We fixed some issues with MadVR We fixed an issue where MP was not able to manage audio volume correctly We updated SQLite to version 3.21. This reduces CPU load and add bugfixes We fixed TSreader crashing with MPEG2 stream We fixed some issues on MediaPortal Configuration New: We added some skin functions We provide a libbluray library based on our own fork.and updated to 1.0.2 (read information below) Along with the above items we kept consolidating our software. Note: For use Bluray with BD-J support, Java 8 must be installed. We recommend the version Java 8u151 in x86 version. Download-Link : Oracle Download Website Full list of changes You can review the complete change log for MP 1.19.0 Pre Release by using the link below: Changelog: MediaPortal 1.19.0 Pre Release Documentation of new features can be found at the following link: What’s new for MediaPortal 1.19.0 Pre Release Installation, Upgrade, Download and Feedback Installation Since we switched to .NET4 you need to make sure you have.NET4 installed on your computer (not needed if you are on Windows 8 because it comes with .NET4, but you NEED the .NET 3.5 features enabled! ). Otherwise you are not able to install MediaPortal and the installer just quits. Download-Link:  Microsoft .NET Framework 4 (Standalone Installer) Aside from that when doing a clean installation of the 1.19.0 Pre Release there is nothing else to worry about. Upgrade Upgrading from MP 1.2.0 Beta or later to 1.19.0 Pre Release All MediaPortal 1.2.0 Beta installations can be upgraded to MP 1.19.0 Pre Release without losing your settings. Plugins: If you are running MediaPortal 1.6.0 or earlier, then it is possible that some of your previously installed plugins will be shown as incompatible after the upgrade to 1.19.0 Pre Release! Whether or not a plugin is incompatible depends on the MediaPortal subsystems the plugin uses. All plugins that work for the 1.7.1 HotFix release, should also work with the 1.19.0 Pre Release. Upgrading Extensions: The easiest way to upgrade your extensions is by launching the  MediaPortal Extension Installer , and let it check for updated versions. However this only works for extensions that use our MPEI system. If the author of the extension releases it as a stand alone installer, you must contact them for an updated version. General note about Upgrades Manually stop TV-Service! On some systems our installer is not able to update the TV-Server installation because its files are locked or the service can not be stopped. For upgrades to 1.19.0 Pre Release we recommend that you manually stop the TV-Service and make sure, via Windows Task Manager  (enable the “all users” option),  that the TvService.exe process is really gone before starting to upgrade. Custom TV-Service properties If you manually changed the properties of the TV-Service  (like restart on error options) , then you must redo these changes after the upgrade. The installer is not able to save and restore your custom service properties when it installs the new version of the TV-Service. Feedback Bugs If you think you found a bug then please post a detailed report in our Bug Reports Forum . Make sure your report includes  all the required information . Incomplete reports will be removed to keep the forum clean.  Download Finally – the download. We hope that you took the time to read this release news entirely because it includes vital information about the major changes.   If you would like to support MediaPortal, we would be happy to receive  a donation ! The Team wishes you a lot of fun with this new release! .::. Download – MediaPortal 1.19.0 Pre Release .::. :: Post a Comment ::

Continue reading here:
MediaPortal 1.19.0 Pre Release

Louisana Police Bust an Infamous Nigerian Email Spam Scammer

MojoKid writes: You have probably at some point been contacted via email spam by someone claiming you are the beneficiary in a will of a Nigerian prince. As the scam goes, all you have to do is submit your personal information and Western Union some funds to process the necessary paperwork, and in return you will receive millions of dollars. One of the people behind the popular scam, Michael Neu, has been arrested by police in Slidell, Louisiana. This may come as a shocker, but Neu is not a prince, nor is he Nigerian. He is a 67-year-old male possibly of German descent (based on his last name) who is facing 269 counts of wire fraud and money laundering for his alleged role as a middle man in the scheme. According to Slidell police, some of the money obtained by Neu was wired to co-conspirators who do actually live in Nigera. Read more of this story at Slashdot.

View article:
Louisana Police Bust an Infamous Nigerian Email Spam Scammer

2017’s biggest cybersecurity facepalms

2017 was a year like no other for cybersecurity. It was the year we found out the horrid truths at Uber and Equifax, and border security took our passwords . A year of WannaCry and Kaspersky , VPNs and blockchains going mainstream, healthcare hacking , Russian hackers , WikiLeaks playing for Putin’s team , and hacking back . In 2017 we learned that cybersecurity is a Lovecraftian game in which you trade sanity for information. Let’s review the year that was (and hopefully will never be again). Moscow mules This was the year Kaspersky finally got all the big press they’ve been angling for. Unfortunately for them, it wasn’t for their research. The antivirus company spent an uncomfortable year in the headlines being accused of working with Russia’s FSB (former KGB) . Eventually those suspicions got it banned from use by US government agencies. Kaspersky’s alleged coziness with Putin’s inner circle has made the rounds in the press and infosec gossip for years. But it came to a head when an NSA probe surfaced, the Senate pushed for a ban, and — oddly — the Trump administration came with the executioner’s axe. Obviously, Kaspersky — the company, and its CEO of the same name — denied the accusations, and offered to work with the US government. They offered up their code for review and filed suit when the ban passed. At this point, the only thing that might save Kaspersky’s reputation in the US is finding us that pee tape. Fingers crossed. Be still my backdoored heart A ransomware attack on Hollywood Presbyterian Hospital in 2016 put health care hacking center stage, but in 2017 it turned into a true nightmare. The WannaCry ransomware attack spread like wildfire, locking up a third of the National Health Service (NHS) in England. That was followed by other worms, like Petya/NotPetya, which hit US hospitals in June. The security of pacemakers was exposed as being awful, specifically in the case of medical device manufacturer St. Jude Medical (now rebranded as Abbott). A lot of people hated on researcher Justine Bone and MedSec for the way they went about exposing pacemaker flaws, but they were right . The FDA put a painful pin in it when it notified the public of a voluntary recall (as a firmware update) of 465, 000 pacemakers made by St. Jude Medical. Meanwhile, white hat hackers put together the first Cyber Med Summit — a doctor-run, hacker boot camp for medical professionals. That the Summit exists is a tiny bit of good news in our medical mess, but it also proved that you should probably make sure your doctor keeps a hacker on staff. Medical staff at the Summit got a wake-up call about medical devices exploits, and concluded they need to add “hacking” to their list of possible problems to assess and diagnose. I’m not crying, you’re crying On May 12, over 150 countries were hit in one weekend by a huge ransomware crimewave named WannaCry . The attack was derived from a remote code execution vulnerability (in Windows XP up through Windows Server 2012) called “EternalBlue, ” found in the April Shadow Brokers/NSA dump. Those who did their Windows updates were not affected. WannaCry demanded $300 in Bitcoin from each victim and among those included were the UK’s National Health Service (NHS). The ransomworm was stopped in its tracks by the registration of a single domain that behaved like a killswitch. The creators apparently neglected to secure their own self destruct button. Researcher MalwareTech was the hero of the day with his quick thinking, but was sadly repaid by having his identity outed by British tabloids. Adding injury to insult, he was later arrested on unrelated charges as he attempted to fly home after the DEF CON hacking conference in August. Two weeks after the attack, Symantec published a report saying the ransomware showed strong links to the Lazarus group (North Korea). Others independently came to the same conclusion. Eight months later, and just in time for his boss’ warmongering on North Korea, Trump team member Thomas P. Bossert wrote in the Wall Street Journal that “the U.S. today publicly attributes the massive “WannaCry” cyberattack to North Korea.” Maybe he’s just a backdoor man US Deputy Attorney General Rod Rosenstein in October introduced the world to the new and totally made-up concept of ” responsible encryption ” — and was promptly laughed out of the collective infosec room. “Responsible encryption is effective secure encryption, coupled with access capabilities, ” he said . He suggested that the feds won’t mandate encryption backdoors “so long as companies can cough up an unencrypted copy of every message, call, photo or other form of communications they handle.” Even non-infosec people thought his new PR buzzwords were suspect. “Look, it’s real simple. Encryption is good for our national security; it’s good for our economy. We should be strengthening encryption, not weakening it. And it’s technically impossible to have strong encryption with any kind of backdoor, ” said Rep. Will Hurd (R-Texas) at The Atlantic’s Cyber Frontier event in Washington, D.C. Politico wrote : It’s a cause Rosenstein has quietly pursued for years, including two cases in 2014 and 2015 when, as the US attorney in Maryland, he sought to take companies to court to make them unscramble their data, a DOJ official told POLITICO. But higher-ups in President Barack Obama’s Justice Department decided against it, said the official, who isn’t authorized to speak to the news media about the cases. To everyone’s dismay, Rosenstein doubled down on his “responsible encryption” campaign when he capitalized on a mass shooting (using as his example the phone of Devin Patrick Kelley who opened fire on a congregation in Texas, killing 26 people). He said , “Nobody has a legitimate privacy interest in that phone … But the company that built it claims that it purposely designed the operating system so that the company cannot open the phone even with an order from a federal judge.” Like Uber, but for Equifax If there was some kind of reverse beauty pageant for worst look, worst behavior, and best example of what not to do with security, we’d need a tiebreaker for 2017. Equifax and Uber dominated the year with their awfulness. Equifax was forced to admit it was hacked badly in both March and July, with the latter affecting around 200 million people (plus 400, 000 in the UK). Motherboard reported that “six months after the researcher first notified the company about the vulnerability, Equifax patched it — but only after the massive breach that made headlines had already taken place… This revelation opens the possibility that more than one group of hackers broke into the company.” Shares of Equifax plummeted 35% after the July disclosure. And news that some of its execs sold off stock before the breach was made public triggered a criminal probe. Which brings us to the “unicorn” that fell from grace . In late November Uber admitted it was hacked in October 2016, putting 57 million users and over half a million drivers at risk. Uber didn’t report the breach to anyone — victims or regulators — then paid $100K to the hackers to keep it quiet, and hid the payment as a bug bounty. All of which led to the high-profile firing and departures of key security team members. Just a couple weeks later, in mid-December, the now-notorious ‘Jacobs letter’ was unsealed, accusing Uber of spying and hacking . “It was written by the attorney of a former employee, Richard Jacobs, and it contains claims that the company routinely tried to hack its competitors to gain an edge, ” Engadget wrote , and “used a team of spies to steal secrets or surveil political figures and even bugged meetings between transport regulators — with some of this information delivered directly to former CEO Travis Kalanick.” The letter was so explosive it’s now the trial between Uber and Waymo — so we can be sure we haven’t seen the last of Uber’s security disasters in the news. Images: Getty Images/iStockphoto (Wannacry); D. Thomas Magee (All illustrations)

Continue Reading:
2017’s biggest cybersecurity facepalms

Chrome OS Will Finally Run Android Apps in the Background

An anonymous reader shares a report: While it’s no longer a novelty to run Android apps on your Chromebook, that doesn’t mean they run well. To date, most of those apps pause when you switch away — fine for a phone, but not what you’d expect on a computer with a multi-window interface. However, they’re about to become far more functional. Chrome Unboxed has learned that the Chrome OS 64 beta introduces Android Parallel Tasks, which lets Android apps run at full bore regardless of what you’re doing. You could watch a video in a mobile app while you’re surfing the web, or take a break from a mobile game without jarring transitions. There’s no guarantee that Android Parallel Tasks will reach the stable Chrome OS 64, so you might not want to plan a purchase around the feature. Read more of this story at Slashdot.

See the original post:
Chrome OS Will Finally Run Android Apps in the Background

Netflix now streams HDR video on Windows 10

You no longer have to turn to your phone or TV to watch Netflix’s more vibrant HDR video selection. The streaming behemoth has added support for playing HDR on Windows 10, both in the native Netflix app and in the Edge browser (sorry, no Chrome here). You’re already set software-wise if you’re running the Fall Creators Update . However, it’s the hardware requirements that might leave you hanging — and we don’t just mean the need for an HDR10-compatible display . Netflix noted that you’ll need one of Intel’s 7th-generation or later Core processors, and you’ll have to use either the integrated graphics or a recent NVIDIA graphics card like the GTX 1050 or higher. For now, at least, anyone in the AMD camp is out of luck. The service said that this is the result of years-long partnerships, although AMD’s Vega graphics are technically capable of the 10 bits per channel color you need for HDR. Technically, there shouldn’t be much getting in the way. The limited hardware options aren’t entirely shocking. HDR is relatively well-established in the living room, but it’s still undercooked in the PC space with not just few devices, but few apps that can actually display it. Netflix’s Windows 10 release is a big help in that sense — it might spur PC makers and software developers to add HDR support knowing that more people can use it. Source: Netflix Tech Blog (Medium) , Netflix Help

See original article:
Netflix now streams HDR video on Windows 10

Plexamp, Plex’s Spin on the Classic Winamp Player, Is the First Project From New Incubator Plex Labs

Media software maker Plex today announced a new incubator and community resource called Plex Labs. “The idea here is to help the company’s internal passion projects gain exposure, along with those from Plex community members, ” reports TechCrunch. “Plex Labs is also unveiling its first product: a music player called Plexamp, ” which is designed to replace the long-lost Winamp. From the report: The player was built by several Plex employees in their free time, and is meant for those who use Plex for music. As the company explains in its announcement, the goal was to build a small player that sits unobtrusively on the desktop and can handle any music format. The team limited itself to a single window, making Plexamp the smaller Plex player to date, in terms of pixel size. Under the hood, Plexamp uses the open source audio player Music Player Daemon (MPD), along with a combination of ES7, Electron, React, and MobX technologies. The end result is a player that runs on either macOS or Windows and works like a native app. That is, you can use media keys for skipping tracks or playing and pausing music, and receive notifications. The player can also handle any music format, and can play music offline when the Plex server runs on your laptop. The player also supports gapless playback, soft transitions and visualizations to accompany your music. Plus, the visualizations’ palette of colors is pulled from the album art, Plex notes. Additionally, Plexamp makes use of a few up-and-coming features that will be included in Plex’s subscription, Plex Pass, in the future. These new features are powering functionality like loudness leveling (to normalize playback volume), smart transitions (to compute the optimal overlap times between tracks), soundprints (to represent tracks visually), waveform seeking (to present a graphical view of tracks), Library stations, and artist radio. Read more of this story at Slashdot.

See the original post:
Plexamp, Plex’s Spin on the Classic Winamp Player, Is the First Project From New Incubator Plex Labs

Microsoft Disables Word DDE Feature To Prevent Further Malware Attacks

An anonymous reader writes: As part of the December 2017 Patch Tuesday, Microsoft has shipped an Office update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware. DDE stands for Dynamic Data Exchange, and this is an Office feature that allows an Office application to load data from other Office applications. For example, a Word file can update a table by pulling data from an Excel file every time the Word file is opened. DDE is an old feature, which Microsoft has superseded via the newer Object Linking and Embedding (OLE) toolkit, but DDE is still supported by Office applications. The December Patch Tuesday disables DDE only in Word, but not Excel or Outlook. The reason is that several cybercrime and spam groups have jumped on this technique, which is much more effective at running malicious code when compared to macros or OLE objects, as it requires minimal interaction with a UI popup that many users do not associate with malware. For Outlook and Excel, Microsoft has published instructions on how users can disable DDE on their own, if they don’t want this feature enabled. Read more of this story at Slashdot.

Continue reading here:
Microsoft Disables Word DDE Feature To Prevent Further Malware Attacks

Chrome 64 Beta Adds Sitewide Audio Muting, Pop-Up Blocker, Windows 10 HDR Video

Chrome 64 is now in beta and it has several new features over version 63. In addition to a stronger pop-up blocker and support for HDR video playback when Windows 10 is in HDR mode, Chrome 64 features sitewide audio muting to block sound when navigating to other pages within a site. 9to5Google reports: An improved pop-up blocker in Chrome 64 prevents sites with abusive experiences — like disguising links as play buttons and site controls, or transparent overlays — from opening new tabs or windows. Meanwhile, as announced in November, other security measures in Chrome will prevent malicious auto-redirects. Beginning in version 64, the browser will counter surprise redirects from third-party content embedded into pages. The browser now blocks third-party iframes unless a user has directly interacted with it. When a redirect attempt occurs, users will remain on their current page with an infobar popping up to detail the block. This version also adds a new sitewide audio muting setting. It will be accessible from the permissions dropdown by tapping the info icon or green lock in the URL bar. This version also brings support for HDR video playback when Windows 10 is in HDR mode. It requires the Windows 10 Fall Creator Update, HDR-compatible graphics card, and display. Meanwhile, on Windows, Google is currently prototyping support for an operating system’s native notification center. Other features include a new “Split view” feature available on Chrome OS. Developers will also be able to take advantage of the Resize Observer API to build responsive sites with “finger control to observe changes to sizes of elements on a page.” Read more of this story at Slashdot.

See the original post:
Chrome 64 Beta Adds Sitewide Audio Muting, Pop-Up Blocker, Windows 10 HDR Video