Windows XP recovery software receives a record number of downloads

Rollback XP, a recovery software created to help protect users from the Windows XP lockdown, has been downloaded 400,000 times. These facts come straight from the company who created the software itself. Considering the fact that it has not even been a month since its release, it is a lot. 

It was in Microsoft’s Tech Ed conference which took place this past May in Houston, Texas where the team that created this freeware came up with the idea. After hearing that companies would have to pay up to $200 per PC in order to get extended support from Microsoft, they decided to create an alternative and charge nothing to users. 

A brief snippet on the Windows XP lockdown, just to refresh your memory: In April of this year, Microsoft discontinued support for Windows XP operating system on April of this year. Despite being nearly 13 years old, this operating system is still widely used worldwide: a little more than one-fourth of the world’s PCs still run on Windows XP. Once the Windows XP lockdown began, users of this operating system would be left unprotected from hacks or viruses Enterprises and organizations that run Windows XP on their public access kiosk systems would be exposed to the aforementioned problems.

Rollback XP promises to be a viable solution against these problems. 

About the software:

Rollback XP is a comprehensive, instant recovery software Windows XP System Restore software similar to Horizon Datasys’ star product, Rollback RX. It functions on a snapshot-based system that allows your PC to be like an instant time machine. In case of any system crash, users can restore their computer to a previous point in time, even if Windows cannot boot. This is possible because the software operates on a sub-operating system below Windows, enabling it to protect the contents of your entire hard drive. 

Rollback XP only works on Windows XP operating system. Another difference is in the number of snapshots. Rollback XP, a freeware, supports a maximum of ten snapshots. For those who wish to upgrade to a greater number of snapshots, a non-freeware option is being developed.



Microsoft fixes 29 vulnerabilities in IE and Windows

As part of Microsoft’s Patch Tuesday for the month of July, the tech-giant fixed 29 vulnerabilities in IE, or Internet Explorer and supported versions of Windows. Most problems were, however, in…yes, you guessed it, Internet Explorer. 

Post from PCMag

Of the six security bulletins released, only two of them—for Internet Explorer and Windows Journal—are  rated as critical, according to Microsoft’s Patch Tuesday advisory. Three are rated as important, and the final bulletin has only a moderate rating. Both the IE and Windows Journal bulletins address remote code execution flaws. The important bulletins fixed elevation of privilege flaws in the on-screen keyboard, ancillary function driver, and DirectShow, and the moderate bulletin fixed a denial-of-service bug in the Microsoft service bus.

Microsoft said it had not observed any attacks in the wild targeting any of these flaws.

IE Oh My
Microsoft fixed 24 flaws in Internet Explorer (MS14-037), one publicly disclosed bug and 23 privately reported ones. This is after Microsoft patched 59 vulnerabilities in Internet Explorer last month. The issues are critical for Internet Explorer 6 to Internet Explorer 11 on Windows machines, but just moderate on Windows servers.

Attackers can exploit the IE bugs by tricking users into visiting a specially crafted malicious site. Once the attack succeeds, the attacker would have the same user rights as the compromised user. Users with fewer rights—not logged in as Administrator, for example—would be less impacted.

“It remains to be seen if Microsoft has cleaned up the Internet Explorer vulnerability closet for the next few months or if this is the new normal,” said Marc Maiffret, CTO of BeyondTrust.

Obscure Windows Software
The issue with Windows Journal (MS14-038) could allow attackers to remotely execute malicious code. Windows Journal is installed by default on all supported versions of Windows, from Vista to 8.1, but isn’t commonly used. Windows Journal can be used on touch-enabled devices as well as non-touch Windows computers to capture handwritten notes. The vulnerability was in how Windows opened files saved in the Windows Journal (.jnt) format.

The Windows Journal bug is a “great example of how unused software can be abused by attackers,” stated Craig Young, a security researcher at Tripwire.

Windows Journal is not installed on Windows Server versions.

Maiffret recommending treating the file extension as if it was an executable and block it on the Web and email gateways.

If there is a reason why the two critical patches can’t be installed immediately, uninstalling Windows Journal and switching to a different Web browser are sufficient workarounds. “While a patch is always preferred, limiting the attack surface is a good backup,” said Tyler Ranguly, manager of security research for Tripwire.

Remaining Patches
The bulletins rated important fixed bugs uncovered during the pwn2own contest back in March. The local elevation of privilege issues can be exploited to give unprivileged users greater access to the vulnerable system. They can be used in chained attacks to compromise the system, suggested Ross Barrett, senior manager of security engineering at Rapid7. “Given the nature of their disclosure, [they] must be known to have exploit code,” Barrett warned.

The ancillary function driver bug can be paired with “something like the Internet Explorer vulnerabilities from this month to allow for drive-by web attacks that result in execution of code in the kernel,” Maiffret said.

How to keep your Windows XP secure

By now it is old news that Microsoft has issued a Windows XP support lockdown. They will no longer offer support for users with Windows XP: no more bug fixes, no more security patches and no more Windows Updates. If you remember a couple of weeks back, Microsoft had to issue an out-of-band security update to fix the problem with Internet Explorer. This will not be very common in the future however.

This is actually a big issue for Microsoft given the number of individuals who still rely on Windows XP. Net Applications, a web analytics company that is dedicated to, among other things, determining operating system usage, has released their 2014 figures. The results for April 2014 are surprising. Windows XP has 27% of the total market share while Windows 8 only has 12%.

This leaves a question: What will millions of these Windows XP users do when their computer faces a security threat? A lot of corporate users on this operating system face losing billions of dollars with their information at the mercy of hackers. Is there an alternative recovery software for Windows XP? Is switching to Windows 8 their only choice?

Thankfully, no.

Software to protect one’s computer against the Windows XP lockdown is out there. Rollback XP is one example. And there always will be. If I remember correctly, when Microsoft discontinued their SteadyState, substitutes quickly surged as a replacement for it. Reboot Restore RX is an example of a SteadyState alternative. It received lot of downloads from users who needed a simple thing such as a restore upon reboot functionality.

Like I mentioned previously, given the high number of users who are still on Windows XP, a software like this will most definitely be needed.

Windows 7 & Vista at more risk than XP: Microsoft

(Article taken from technotification)
Computers running either Windows7 or Windows Vista operating systems are more likely to be infected by malware than Windows XP machines, according toa recent report by Microsoft.

The company’s biannual Security Intelligence Report (SIR) included figures showing that in the last quarter of 2013, Windows XP computers had an infection rate of 2.42%, compared to 3.24% for Windows Vista and 2.59% for Windows 7.

Microsoft said the data had been “normalized” to account for the different numbers of computers running each version of the operating system, with Windows 8 machines showing a 1.73% infection rate and Windows 8.1 (the latest version) just 0.08%.

The software giant credited the apparent insecurity of Windows 7 and Vista with a new threat from ‘Rotbrow’ malware targeting internet browsers, but security experts say this doesn’t mean that XP is more secure than more recent operating systems.

Speaking to The Independent, Graham Cluley pointed out that users of more modern versions of Windows could be exposing themselves to greater risks simply by using the internet more.

We’re hopeful that the number of Windows XP computers is rapidly diminishing, and that fewer and fewer of them are being used to regularly access the internet,” said Mr Cluley.

“If you think about it, if you have an old creaky computer still running Windows XP and a Windows 7 computer – which one are you more likely to be using regularly?”

Mr Cluley also notes that the statistics from Microsoft’s report cover a time period when Windows XP was still receiving regular security updates – fixes that Microsoft stopped issuing at the beginning of April this year.

Microsoft is also soon to issue its latest release of security patches on May 13 (an event referred to as Patch Tuesday) which, for the first time, will no longer include updates to Windows XP but will highlight vulnerabilities to the operating system.

Users of more recent Windows operating systems are recommended to download Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) to block malware and, if still running Windows XP, to upgrade as soon as possible.