Twitter Users Blocked By Trump Sue, Claim @realDonaldTrump Is Public Forum Slashdotby BeauHD on court at January 1, 1970, 1:00 am (cached at July 11, 2017, 11:35 pm)

An anonymous reader quotes a report from Ars Technica: A handful of Twitter users, backed by the Knight First Amendment Institute at Columbia University, sued President Donald Trump on Tuesday, claiming their constitutional rights are being violated because the president has blocked them from his @realDonaldTrump handle. The suit claims that Trump's Twitter feed is a public forum and an official voice of the president. Excluding people from reading or replying to his tweets -- especially because they tweeted critical comments -- amounts to a First Amendment breach, according to the lawsuit. "The @realDonaldTrump account is a kind of digital town hall in which the president and his aides use the tweet function to communicate news and information to the public, and members of the public use the reply function to respond to the president and his aides and exchange views with one another," according to the lawsuit (PDF) filed in New York federal court. "Defendants' viewpoint-based blocking of the Individual Plaintiffs from the @realDonaldTrump account infringes the Individual Plaintiffs' First Amendment rights. It imposes an unconstitutional restriction on their participation in a designated public forum," the suit says. "It imposes an unconstitutional restriction on their right to access statements that Defendants are otherwise making available to the public at large. It also imposes an unconstitutional restriction on their right to petition the government for redress of grievances."

Read more of this story at Slashdot.

Big cash boost for UK satellite sector BBC News | Science/Nature | UK Edition(cached at July 11, 2017, 11:30 pm)

The UK government formally announces a more-than-£100m investment in new satellite and rocket test facilities.
ONC Leader: Privacy, Security Remain Top Priorities (InfoRiskToday) SANS ISC SecNewsFeed(cached at July 11, 2017, 11:30 pm)

Kaspersky under scrutiny after Bloomberg story claims close links to FSB (ArsTechnic SANS ISC SecNewsFeed(cached at July 11, 2017, 11:30 pm)

Android Security Bulletin July 2017: What you need to know (TechRepublic) SANS ISC SecNewsFeed(cached at July 11, 2017, 11:30 pm)

ISC Stormcast For Wednesday, July 12th 2017 https://isc.sans.edu/podcastdetail.html? SANS Internet Storm Center, InfoCON: green(cached at July 11, 2017, 11:30 pm)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Google Has Been Paying Academic Researchers Who Write Favorable Papers: Report Slashdotby msmash on google at January 1, 1970, 1:00 am (cached at July 11, 2017, 11:06 pm)

Google has paid researchers and academics who have worked on projects that support the company's positions in battles with regulators, a report in The Wall Street Journal (paywalled) said on Tuesday. From a report: Google's practice might not sound all that different from lobbying, but The Wall Street Journal revealed that some of the professors, including a Paul Heald from the University of Illinois, didn't disclose Google's payments. Heald is one of "more than a dozen" such professors who accepted money from Google, according to The Wall Street Journal. Google has reason to try to get as many folks on its side as it can. The company has faced almost constant scrutiny for its business practices, most recently a record antitrust fine of $2.7 billion in the European Union. Tens of thousands of dollars to professors here and there could have helped it avoid that fine, and others.

Read more of this story at Slashdot.

Saudi Arabia executes Shia men for 'violent attacks' AL JAZEERA ENGLISH (AJE)(cached at July 11, 2017, 11:00 pm)

The four men were accused of carrying out attacks in Qatif region, where Shia groups have clashed with security forces.
Jack Shaheen inspired me even before I learned to read AL JAZEERA ENGLISH (AJE)(cached at July 11, 2017, 11:00 pm)

The American writer devoted most of his life to combatting the negative portrayal of Arabs and Muslims in film.
Portugal charges 18 police with 'torture' of black men AL JAZEERA ENGLISH (AJE)(cached at July 11, 2017, 11:00 pm)

Entire police station in Alfragide faces trial on charges of torture and racially-motivated crimes over a 2015 incident.
Qatar questions timing of Riyadh agreement leak AL JAZEERA ENGLISH (AJE)(cached at July 11, 2017, 11:00 pm)

Foreign Minister Sheikh Mohammed says release of 'classified' document was aimed at diminishing US, Kuwait mediation.
It's July 2017 and your expensive HoloLens can be pwned over Wi-Fi (The Register) SANS ISC SecNewsFeed(cached at July 11, 2017, 11:00 pm)

July's Microsoft Patch Tuesday, (Tue, Jul 11th) SANS Internet Storm Center, InfoCON: green(cached at July 11, 2017, 11:00 pm)

TodaysMicrosoft Patch Tuesdayfixes critical and important flaws that, if exploited, could give an attacker a range of possibilities - from privilege escalation to remote code execution (RCE) - on different Windows OS and Microsoft Office versions.

One that caught my attention was the RCE which affects the Windows Search service [1] and may allow an unauthenticated attacker to take control over the target system through a SMB connection giving him the possibility to install programs, view, change or delete data or create new accounts with full user rights.

According to Microsoft Advisories, most of the vulnerabilities were privately disclosed and there is no exploit available [yet] for the most critical ones. In either case, make sure to proceed with the updates the recent Wannacry and NotPetya outbreaks told us that maintaining critical vulnerabilities on enterprise Microsoft environments is not a healthy policy, especially when it may allow lateral movement.

Ive summarized the flaws that I consider more important on the list below with the associated CVE, CVSS base score and advisory URLs. Before I forget, besides Microsoft vulnerabilities, there is an important Flash Player update [2].

CVE-2017-8590 | Windows CLFS Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory.

In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control of the affected system. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

The update addresses the vulnerability by correcting how CLFS handles objects in memory.

Note: The Common Log File System (CLFS) is a high-performance, general-purpose log file subsystem that dedicated client applications can use and multiple clients can share to optimize log access.

CVSS base: 8.8
CVE: CVE-2017-8590
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8590

or create new accounts with full user rights.

To exploit the vulnerability, the attacker could send specially crafted messages to the Windows Search service. An attacker with access to a target computer could exploit this vulnerability to elevate privileges and take control of the computer. Additionally, in an enterprise scenario, a remote unauthenticated attacker could remotely trigger the vulnerability through an SMB connection and then take control of a target computer.

The security update addresses the vulnerability by correcting how Windows Search handles objects in memory.

CVSS base: 8.1
CVE: CVE-2017-8589
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8589

--

CVE-2017-8563 | Windows Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol.

In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a domain controller. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

The update addresses this vulnerability by incorporating enhancements to authentication protocols designed to mitigate authentication attacks. It revolves around the concept of channel binding information.

CVE: CVE-2017-8563
CVSS base: 7.5
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8563

CVE-2017-8565 | Windows PowerShell Remote Code Execution Vulnerability

A remote code execution vulnerability exists in PowerShell when PSObject wraps a CIM Instance. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system.

In an attack scenario, an attacker could execute malicious code in a PowerShell remote session.

The update addresses the vulnerability by correcting how PowerShell deserializes user supplied scripts.

CVE: CVE-2017-8565
CVSS base: 7.5
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8565

CVE-2017-8495 | Kerberos SNAME Security Feature Bypass Vulnerability

A security feature bypass vulnerability exists in Microsoft Windows when Kerberos fails to prevent tampering with the SNAME field during ticket exchange. An attacker who successfully exploited this vulnerability could use it to bypass Extended Protection for Authentication.

To exploit this vulnerability, an attacker would have to be able to launch a man-in-the-middle (MiTM) attack against the traffic passing between a client and the server.

The update addresses this vulnerability by adding integrity protection to the SNAME field.

CVE: CVE-2017-8495
CVSS base: 7.5
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8495

CVE-2017-8588 | WordPad Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that Microsoft WordPad parses specially crafted files.

Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft WordPad. In an email attack scenario, an attacker could exploit the vulnerability by sending a specially crafted file to the user and then convincing the user to open the file.

The update addresses the vulnerability by correcting the way that Microsoft WordPad parses specially crafted files, and by enabling API functionality in Windows that Microsoft WordPad will leverage to resolve the identified issue.

CVE: CVE-2017-8588
CVSS base: 6.7
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8588

CVE-2017-8463 | Windows Explorer Remote Code Execution Vulnerability

A remote code execution vulnerability exists when Windows Explorer improperly handles executable files and shares during rename operations. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another user. Users not running as administrators would be less affected.

To exploit this vulnerability, an attacker would first share both a folder and malware named with an executable extension, and then trick the user into thinking that the malware was the folder. The attacker could not force the user to open or browse the share but could use email or instant messages to trick them into doing so.

The update addresses the vulnerability by correcting how Windows Explorer handles executable files and shares during rename operations.

CVE: CVE-2017-8463
CVSS base: 6.3
Advisory: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8463

ADV170009 | July Flash Security Update

This security update addresses the following vulnerabilities, which are described in Adobe Security Bulletin APSB17-21: CVE-2017-3099, CVE-2017-3080, CVE-2017-3100

Severity: Critical

Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170009

References

[1] https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8589

[2] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170009

--
Renato Marinho
Morphus Labs | LinkedIn |Twitter

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Apple Launches Repair Program for First-Generation Apple Watches TidBITS(cached at July 11, 2017, 10:36 pm)

If the back cover of your first-generation Apple Watch has come loose, Apple will repair it for free.

 

Read the full article at TidBITS, the oldest continuously published technology publication on the Internet. To get a full-text RSS feed, help support our work and become a TidBITS member! Members also enjoy an ad-free version of our Web site, email delivery of individual articles, the ability to make long comments with live links, and discounts on Take Control orders and other Apple-related products.

EFF's Latest Privacy Report Criticizes Amazon and WhatsApp Over Policies That 'Fall Slashdotby msmash on privacy at January 1, 1970, 1:00 am (cached at July 11, 2017, 10:35 pm)

An anonymous reader shares a report: The Electronic Frontier Foundation has published the latest edition of its "Who has your back" privacy report. This is the seventh report from the digital rights group, and this year it criticizes both WhatsApp and Amazon for having policies that "fall short of other similar technology companies." Four big telecom companies -- AT&T, Comcast, T-Mobile, and Verizon -- performed very poorly, while at the other end of the scale Adobe, Credo, Dropbox, Lyft, Pinterest, Sonic, Uber, Wickr, and WordPress were all praised. In all, the report rates 26 technology companies in five key areas relating to privacy and government data requests: "Follows industry-wide best practices," "Tells users about government data requests," "Promises not to sell out users," "Stands up to NSL gag orders" and "Pro-user public policy: Reform 702." While the report points out that some progress has been made, generally speaking, in the technology world, AT&T, Comcast, T-Mobile, and Verizon were all awarded a single star out of a possible five. Amazon and WhatsApp both scored just two out of five, leading the Electronic Freedom Foundation to say: "We urge both Amazon and WhatsApp to improve their policies in the coming year so they match the standards of other major online services."

Read more of this story at Slashdot.