>running Windows, a virus in itself. Thanks to BillGates.
-
INTEL Processor BackDoors
DID YOU KNOW NSA FORCED a WINDOWS PATCH ?
GHIDRA is Your DIGITAL FREN; 4some
https://www.nsa.gov/News-Features/News-Stories/Article-View/Article/2056772/a-very-important-patch-tuesday/
January 14, 2020
A Very Important Patch Tuesday
By Neal Ziring, Technical Director - NSA Cybersecurity Directorate
On January 14, Microsoft released a set of patches for the Windows platform.
While all of the issues addressed in the patch release are serious, this article will discuss one of them:
CVE-2020-0601. Above anything else, we urge everyone to take action and patch their systems.
CVE-2020-0601 is a serious vulnerability, because it can be exploited to undermine Public Key Infrastructure (PKI) trust.
PKI is a set of mechanisms that home users, businesses, and governments rely upon in a wide variety of ways.
The vulnerability permits an attacker to craft PKI certificates to spoof trusted identifies, such as individuals, web sites,
software companies, service providers, or others. Using a forged certificate, the attacker can (under certain conditions)
gain the trust of users or services on vulnerable systems, and leverage that trust to compromise them.
This kind of vulnerability may shake our belief in the strength of cryptographic authentication mechanisms and make us
question if we can really rely on them. Fortunately, we can. CVE-2020-0601 reflects a weakness in the implementation
of one subtle aspect of PKI certificate validation.
The technology and standards are sound; it is one implementation that needs repair.
CVE-2020-0601 poses significant risk for enterprises and systems that depend on PKI for trust – as all of us do.
The patch is the only comprehensive means to mitigate the risk.
https://www.komando.com/security-privacy/nsa-windows-10-security-flaw-how-to-download-patch/701839/
January 15, 2020
Patch to fix major security flaw in Windows isn’t working – here’s what to do
It’s not too often our intelligence services step into consumer affairs.
Organizations like the CIA and NSA like to remain in the background
— it’s how they catch spies and terrorists. But when a security flaw is dangerous enough, the equation changes.
For example, the NSA previously spoke out about an urgent Windows update that stopped BlueKeep,
a dangerous security exploit that could let hackers take over computers worldwide.
Tap or click to find out how bad this bug really was.
And now, a new bug has prompted the NSA to urge Windows users to update immediately.
This patch fixes a critical flaw that affects 900 million devices.
If unaddressed, your computer can be duped into thinking viruses are ordinary files.
Unfortunately, the update didn’t roll out as smoothly as expected.
But in true Microsoft fashion, the fix has a fix of its own.
Here’s how you can safely update your PC.
Update your Windows 10 system immediately!
This week, Microsoft released a patch for a critical windows vulnerability with help from none other than the NSA. The announcement on the organization’s webpage explains the NSA discovered a dangerous flaw in Windows 10 that allows malware to masquerade as ordinary software.
Hackers can take advantage of the flaw, thanks to an issue with a part of Windows called CryptoAPI.
This system component checks apps and programs for “developer signatures” that prove they come from trusted sources.
By exploiting the flaw, a hacker could spoof a piece of malware to make it look like a normal program. This would allow them to quietly and dangerously infect computers without users ever being aware something is wrong.
personally use both W10pro {for AMD CPU}, and LINUX variants for {INTEL CPU}