Month: July 2015

Windows 10 How To: Manually Trigger Reserved Windows 10 Update

Windows 10 is rolling out today in several countries across the globe in a phased roll out. If you’re one of those users who reserved it on Windows 7 or Windows 8/8.1, and don’t see the update notification, there’s a good news for you. You can manually start the download by following a few simple steps (via Windows Central). As a disclaimer, this trigger should start the update but may not.,

Before you kick off, make sure you’re ready to install the Windows 10 upgrade. You can check out our guide on how to prepare your system for Windows 10. Next, make sure your system can automatically download and install Windows Update. After you’ve enabled automatic Windows Update, open Command Prompt as an administrator and type “wuauclt.exe /updatenow”. This should start the Windows 10 download on your system.

Source: Windows 10 How To: manually trigger reserved Windows 10 update

Your Free Windows 10 Upgrade is Here

So are you ready yet to upgrade. Personally I can’t wait but I will be cautious about upgrading my work PC. Of course that’s a company decision. But I will be upgrading the laptops at home. Just have to pry them out of the hands of the owners first.

Of course I will promise them that I won’t break it with the upgrade. Please Microsoft don’t let me down I will never hear the end of it.  At least there is a rollback option but a time limit of 30 days. Why a time limit at all. Guess Microsoft doesn’t want you to go back and I’m pretty sure that I will stick with Windows 10. The preview has been very interesting and much more like the windows that people are used to but with a lot more added bells and whistles.

Should be fun trying to convince the family. But you never know they may want to upgrade anyway. Hopefully.

Your Free Windows 10 is Here
Your Free Windows 10 is Here

Here are a few links from the BBC about what they think of Windows 10 and an interview with Satya Nadella.

Thanks for open sourcing .NET say Point of Sale villains

VXers say Microsoft’s good intentions let them brew truly evil malware

Trend Micro researcher Jay Yaneza says Point of Sale malware has begun using Microsoft .NET, following its release as open source last year.

Yaneza found the new so-called GamaPoS malware being distributed to US organisations including credit unions, developers, and pet care businesses through the resurgent Andromeda botnet. He says the use of .NET as a platform to build point of sales malware is unique and likely to be adopted by the criminal underground.

“GamaPoS holds the distinction of being a .NET scraper — something unseen in prior PoS threats,” Yaneza says .

“We can attribute this development to the fact that it is easier to create malware in the .NET platform and, now that Microsoft made it available as an open-source platform, more developers are expected to use it for their applications.

“This makes .NET a viable platform to use for attacks.”

Yaneza says GamaPoS uses Andromeda’s backdoors to spread in a shotgun fashion further infecting about four percent of the botnet’s existing victims.

The malware combines two malicious features including PsExec, which hackers used to help pop retailer Target last year, and the Mimikatz hack tool that is considered one of the best vacuumers of Windows credentials.

That combination grants attackers a high degree of capability to move laterally inside breached networks.

Andromedia infections.

Victims are targeted using phishing scams that masquerade as would-be guidance on Payment Card Industry Data Security Standard (PCI DSS) or as information on installing Oracle’s MICROS, a popular payment operating system which it can also compromise.

GamaPoS will siphon Visa and Discover cards to its command and control servers over HTTPS.

The attack campaign organisers are thought to be also spreading the NitLovePoS payment operating system malware found in May.

“Using an old botnet as a shotgun method to cast a wide net for targets has its merits,” Yaneza says.

“Using spam and exploit kits to establish a large mass of bots enables operators to steal information from specific targets, some of which can be resold to other threat actors.”


Source: Thanks for open sourcing .NET say Point of Sale villains • The Register