
By Adam Satariano, Ryan Mac and Tiffany Hsu
The new owner of Twitter has urged his followers to vote Republican.
Published: November 7, 2022 at 06:00PM
from NYT Technology https://ift.tt/tue8Zac
via IFTTT

By Adam Satariano, Ryan Mac and Tiffany Hsu
The new owner of Twitter has urged his followers to vote Republican.
Published: November 7, 2022 at 06:00PM
from NYT Technology https://ift.tt/tue8Zac
via IFTTT

By David Yaffe-Bellany and Erin Griffith
Binance, the world’s largest cryptocurrency exchange, said it had reached a deal to buy FTX, amid fears the industry could enter another meltdown.
Published: November 7, 2022 at 06:00PM
from NYT Technology https://ift.tt/i5oAN2q
via IFTTT
Let’s face it: Having “2022 election” in the headline above is probably the only reason anyone might read this story today. Still, while most of us here in the United States are anxiously awaiting the results of how well we’ve patched our Democracy, it seems fitting that Microsoft Corp. today released gobs of security patches for its ubiquitous Windows operating systems. November’s patch batch includes fixes for a whopping six zero-day security vulnerabilities that miscreants and malware are already exploiting in the wild.

Probably the scariest of the zero-day flaws is CVE-2022-41128, a “critical” weakness in the Windows scripting languages that could be used to foist malicious software on vulnerable users who do nothing more than browse to a hacked or malicious site that exploits the weakness. Microsoft credits Google with reporting the vulnerability, which earned a CVSS score of 8.8.
CVE-2022-41073 is a zero-day flaw in the Windows Print Spooler, a Windows component that Microsoft has patched mightily over the past year. Kevin Breen, director of cyber threat research at Immersive Labs, noted that the print spooler has been a popular target for vulnerabilities in the last 12 months, with this marking the 9th patch.
The third zero-day Microsoft patched this month is CVE-2022-41125, which is an “elevation of privilege” vulnerability in the Windows Cryptography API: Next Generation (CNG) Key Isolation Service, a service for isolating private keys. Satnam Narang, senior staff research engineer at Tenable, said exploitation of this vulnerability could grant an attacker SYSTEM privileges.
The fourth zero-day, CVE-2022-41091, was previously disclosed and widely reported on in October. It is a Security Feature Bypass of “Windows Mark of the Web” – a mechanism meant to flag files that have come from an untrusted source.
The other two zero-day bugs Microsoft patched this month were for vulnerabilities being exploited in Exchange Server. News that these two Exchange flaws were being exploited in the wild surfaced in late September 2022, and many were surprised when Microsoft let October’s Patch Tuesday sail by without issuing official patches for them (the company instead issued mitigation instructions that it was forced to revise multiple times). Today’s patch batch addresses both issues.
Greg Wiseman, product manager at Rapid7, said the Exchange flaw CVE-2022-41040 is a “critical” elevation of privilege vulnerability, and CVE-2022-41082 is considered Important, allowing Remote Code Execution (RCE) when PowerShell is accessible to the attacker.
“Both vulnerabilities have been exploited in the wild,” Wiseman said. “Four other CVEs affecting Exchange Server have also been addressed this month. Three are rated as Important, and CVE-2022-41080 is another privilege escalation vulnerability considered Critical. Customers are advised to update their Exchange Server systems immediately, regardless of whether any previously recommended mitigation steps have been applied. The mitigation rules are no longer recommended once systems have been patched.”
Adobe usually issues security updates for its products on Patch Tuesday, but it did not this month. For a closer look at the patches released by Microsoft today and indexed by severity and other metrics, check out the always-useful Patch Tuesday roundup from the SANS Internet Storm Center. And it’s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates: AskWoody.com usually has the lowdown on any patches that may be causing problems for Windows users.
As always, please consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these updates, please drop a note about it here in the comments.
from Krebs on Security https://ift.tt/cXngjN1
via IFTTT
Cash is safe—for now. Contactless payment methods, like Apple Pay or Google Wallet, are more of a threat to the existence of physical cards.
from Gear Latest https://ift.tt/IJlktWH
via IFTTT

By BY CECILIA KANG
The effort is one of several misinformation rapid response teams run by state and local officials to confront problematic online assertions that fuel voter distrust.
Published: November 8, 2022 at 01:48PM
from NYT Technology https://ift.tt/tWMfUSz
via IFTTT

By BY STUART A. THOMPSON, JACK HEALY AND ALEXANDRA BERZON
Published: November 8, 2022 at 11:06AM
from NYT Technology https://ift.tt/q9cwHFl
via IFTTT

By BY CECILIA KANG
The effort is one of several misinformation rapid response teams run by state and local officials to confront problematic online assertions that fuel voter distrust.
Published: November 8, 2022 at 01:48PM
from NYT Technology https://ift.tt/9u6tTQY
via IFTTT

By BY ERIN GRIFFITH
The founder of the failed blood testing start-up Theranos faces a maximum sentence of 20 years in prison.
Published: November 8, 2022 at 12:18PM
from NYT Technology https://ift.tt/5oeTd02
via IFTTT

By BY ADAM SATARIANO
The new owner of Twitter has urged his followers to vote Republican.
Published: November 8, 2022 at 11:05AM
from NYT Technology https://ift.tt/tue8Zac
via IFTTT
Jurisprudence isn’t like arithmetic… two negatives never make a positive!
from Naked Security https://ift.tt/AwRpWC1
via IFTTT