Microsoft update breaks Calendar and Mail on Windows 10 phones

Posted on

by Lisa Vaas, Sophos

Still reeling from last week’s Windows 10 Pro debacle, Microsoft dropped a fresh pile of “Oops!” onto Windows 10 Mobile users.

On Wednesday, users started reporting that an app update had broken Mail and Calendar:

Mail and Calendar no longer starts. After a short flash screen the app crashed back to the main screen. Tried restart and soft reset.

App got updated today 07-11-2018. This morning before the update it worked fine.

The problems showed up immediately after Microsoft released update 16006.11001.20083.0.

As of the following Tuesday afternoon, the initial post had tallied 431 “I have the same question” and 306 replies: a combination of “me-too’s” and “Is it time to jump ship and climb on board with Android/iOS/Google?”

By Saturday, however, many users were sighing with relief as they got back Outlook Mail and Calendar on their mobile devices, in spite of Windows 10 Phone being a nearly dead platform. As in, Microsoft is no longer developing new features, though it’s still supporting it with bug fixes and security updates.

As one Redditor noted, they weren’t even sure a fix would be forthcoming, given that their phone’s build – they said they were on a Nokia Lumia 1520 – is no longer officially supported.

The fact that there was a fix at all is surprising, but the quick turn around time was even more surprising… I’ll be making the transition back to team Android eventually but this fix allows me more time to come up w/ the scratch to actually get a phone a I want as opposed to buying something cheap to fill the gap…..Once again, to whatever nameless dev/coder(s) in Redmond who fixed this, thanks a billion!

Microsoft confirmed the issue with Windows Latest, apologizing and saying that its engineers were on it.

From a post from an employee on Feedback Hub:

We understand that many users on Windows Phone are experiencing crashes with Outlook Mail and Calendar on the latest update 16006.11001.20083.0 on phones running on Windows build RS1. We apologize for the issue and our engineers are quickly working on a fix for this. Please stay tuned.

Although we won’t be seeing any major software updates for Windows Phones, Microsoft is still going to issue monthly, cumulative updates for the platform, and Windows Phone will be supported until late 2019.

Well done, o ye nameless dev/coder of Redmond: consider thy haste to have been well-received. Go forth, Microsoft, and try hard not to fall on your face for at least a few more days: the wails from exasperated users with skewered production schedules was making the internet froth!

New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom

Posted on

Discovery shows China continues to sabotage critical technology components bound for America

Updated on

Originally posted in Bloomberg – Read Article Here

A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company.

The security expert, Yossi Appleboum, provided documents, analysis and other evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015.

Appleboum previously worked in the technology unit of the Israeli Army Intelligence Corps and is now co-chief executive officer of Sepio Systems in Gaithersburg, Maryland. His firm specializes in hardware security and was hired to scan several large data centers belonging to the telecommunications company. Bloomberg is not identifying the company due to Appleboum’s nondisclosure agreement with the client. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector, a component that’s used to attach network cables to the computer, Appleboum said.

The executive said he has seen similar manipulations of different vendors’ computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim — so is everyone else,” he said. Appleboum said his concern is that there are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. “That’s the problem with the Chinese supply chain,” he said.

Supermicro, based in San Jose, California, gave this statement: “The security of our customers and the integrity of our products are core to our business and our company values. We take care to secure the integrity of our products throughout the manufacturing process, and supply chain security is an important topic of discussion for our industry. We still have no knowledge of any unauthorized components and have not been informed by any customer that such components have been found. We are dismayed that Bloomberg would give us only limited information, no documentation, and half a day to respond to these new allegations.”

Bloomberg News first contacted Supermicro for comment on this story on Monday at 9:23 a.m. Eastern time and gave the company 24 hours to respond.

Supermicro said after the earlier story that it “strongly refutes” reports that servers it sold to customers contained malicious microchips. China’s embassy in Washington did not return a request for comment Monday. In response to the earlier Bloomberg Businessweek investigation, China’s Ministry of Foreign Affairs didn’t directly address questions about the manipulation of Supermicro servers but said supply chain security is “an issue of common concern, and China is also a victim.”

Supermicro shares plunged 41 percent last Thursday, the most since it became a public company in 2007, following the Bloomberg Businessweek revelations about the hacked servers. They fell as much as 27 percent on Tuesday after the latest story.

The more recent manipulation is different from the one described in the Bloomberg Businessweek report last week, but it shares key characteristics: They’re both designed to give attackers invisible access to data on a computer network in which the server is installed; and the alterations were found to have been made at the factory as the motherboard was being produced by a Supermicro subcontractor in China.

Based on his inspection of the device, Appleboum determined that the telecom company’s server was modified at the factory where it was manufactured. He said that he was told by Western intelligence contacts that the device was made at a Supermicro subcontractor factory in Guangzhou, a port city in southeastern China. Guangzhou is 90 miles upstream from Shenzhen, dubbed the `Silicon Valley of Hardware,’ and home to giants such as Tencent Holdings Ltd. and Huawei Technologies Co. Ltd.

The tampered hardware was found in a facility that had large numbers of Supermicro servers, and the telecommunication company’s technicians couldn’t answer what kind of data was pulsing through the infected one, said Appleboum, who accompanied them for a visual inspection of the machine. It’s not clear if the telecommunications company contacted the FBI about the discovery. An FBI spokeswoman declined to comment on whether it was aware of the finding.

AT&T Inc. spokesman Fletcher Cook said, “These devices are not part of our network, and we are not affected.” Verizon Communications Inc. had no immediate comment on whether the malicious component was found in one of its servers. T-Mobile U.S. Inc. and Sprint Corp. didn’t respond to requests for comment.

Sepio Systems’ board includes Chairman Tamir Pardo, former director of the Israeli Mossad, the national defense agency of Israel, and its advisory board includes Robert Bigman, former chief information security officer of the U.S. Central Intelligence Agency.

U.S. communications networks are an important target of foreign intelligence agencies, because data from millions of mobile phones, computers, and other devices pass through their systems. Hardware implants are key tools used to create covert openings into those networks, perform reconnaissance and hunt for corporate intellectual property or government secrets.

The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013. In e-mails, Appleboum and his team refer to the implant as their “old friend,” because he said they had previously seen several variations in investigations of hardware made by other companies manufacturing in China.

In Bloomberg Businessweek’s report, one official said investigators found that the Chinese infiltration through Supermicro reached almost 30 companies, including Amazon.com Inc. and Apple Inc. Both Amazon and Apple also disputed the findings. The U.S. Department of Homeland Security said it has “no reason to doubt” the companies’ denials of Bloomberg Businessweek’s reporting.

People familiar with the federal investigation into the 2014-2015 attacks say that it is being led by the FBI’s cyber and counterintelligence teams, and that DHS may not have been involved. Counterintelligence investigations are among the FBI’s most closely held and few officials and agencies outside of those units are briefed on the existence of those investigations.

Appleboum said that he’s consulted with intelligence agencies outside the U.S. that have told him they’ve been tracking the manipulation of Supermicro hardware, and the hardware of other companies, for some time.

In response to the Bloomberg Businessweek story, the Norwegian National Security Authority said last week that it had been “aware of an issue” connected to Supermicro products since June.  It couldn’t confirm the details of Bloomberg’s reporting, a statement from the authority said, but it has recently been in dialogue with partners over the issue.

Hardware manipulation is extremely difficult to detect, which is why intelligence agencies invest billions of dollars in such sabotage. The U.S. is known to have extensive programs to seed technology heading to foreign countries with spy implants, based on revelations from former CIA employee Edward Snowden. But China appears to be aggressively deploying its own versions, which take advantage of the grip the country has over global technology manufacturing.

Three security experts who have analyzed foreign hardware implants for the U.S. Department of Defense confirmed that the way Sepio’s software detected the implant is sound. One of the few ways to identify suspicious hardware is by looking at the lowest levels of network traffic. Those include not only normal network transmissions, but also analog signals — such as power consumption — that can indicate the presence of a covert piece of hardware.

In the case of the telecommunications company, Sepio’s technology detected that the tampered Supermicro server actually appeared on the network as two devices in one. The legitimate server was communicating one way, and the implant another, but all the traffic appeared to be coming from the same trusted server, which allowed it to pass through security filters.

Appleboum said one key sign of the implant is that the manipulated Ethernet connector has metal sides instead of the usual plastic ones. The metal is necessary to diffuse heat from the chip hidden inside, which acts like a mini computer. “The module looks really innocent, high quality and ‘original’ but it was added as part of a supply chain attack,” he said.

The goal of hardware implants is to establish a covert staging area within sensitive networks, and that’s what Appleboum and his team concluded in this case. They decided it represented a serious security breach, along with multiple rogue electronics also detected on the network, and alerted the client’s security team in August, which then removed them for analysis. Once the implant was identified and the server removed, Sepio’s team was not able to perform further analysis on the chip.

The threat from hardware implants “is very real,” said Sean Kanuck, who until 2016 was the top cyber official inside the Office of the Director of National Intelligence. He’s now director of future conflict and cyber security for the International Institute for Strategic Studies in Washington. Hardware implants can give attackers power that software attacks don’t.

“Manufacturers that overlook this concern are ignoring a potentially serious problem,” Kanuck said. “Capable cyber actors — like the Chinese intelligence and security services — can access the IT supply chain at multiple points to create advanced and persistent subversions.”

One of the keys to any successful hardware attack is altering components that have an ample power supply to them, a daunting challenge the deeper into a motherboard you go. That’s why peripherals such as keyboards and mice are also perennial favorites for intelligence agencies to target, Appleboum said.

In the wake of Bloomberg’s reporting on the attack against Supermicro products, security experts say that teams around the world, from large banks and cloud computing providers to small research labs and startups, are analyzing their servers and other hardware for modifications, a stark change from normal practices. Their findings won’t necessarily be made public, since hardware manipulation is typically designed to access government and corporate secrets, rather than consumer data.

National security experts say a key problem is that, in a cybersecurity industry approaching $100 billion in revenue annually, very little of that has been spent on inspecting hardware for tampering. That’s allowed intelligence agencies around the world to work relatively unimpeded, with China holding a key advantage.

“For China, these efforts are all-encompassing,” said Tony Lawrence, CEO of VOR Technology, a Columbia, Maryland-based contractor to the intelligence community. “There is no way for us to identify the gravity or the size of these exploits — we don’t know until we find some. It could be all over the place — it could be anything coming out of China. The unknown is what gets you and that’s where we are now. We don’t know the level of exploits within our own systems.”
— With assistance by Scott Moritz

Amazon is having a technical meltdown that’s left Alexa and its AWS cloud service reeling on its biggest shopping day of the year

Posted on
amazon web services

Read Article At Business Insider

Even amazon has issues at times!

  • Amazon’s website has been up and down since its Prime Day sales event kicked off at 3 p.m. ET in the US.
  • Roughly an hour after Prime Day began, Amazon’s personal AI assistant, Alexa, also started experiencing technical problems.
  • Users report being unable to login to the app, and Alexa-powered devices being unresponsive to commands.

Amazon’s website has been up and down since the start of its Prime Day sales extravaganza in the United States on Monday, and now the issues are starting to affect the company’s AI personal assistant, Alexa, and portions of its cloud hosting service as well.

User reports to DownDetector.com are showing that Alexa and the corresponding smartphone app started having issues around 3:50 p.m., nearly an hour after Prime Day — Amazon’s biggest shopping day of the year — began.

According to the site, poor server connection and issues logging in are among the most commonly reported by users. One commentator says when giving a command to his Alexa-powered device, the personal assistant cannot process the request and just says, “Sorry, something went wrong.”

Business Insider reporters were unable to log in to the app on multiple devices, and received multiple error messages, including this one:

Alexa’s downtime is one of many technical issues Amazon is facing on its busiest day of the year, including temporary website crashes and broken links across the site.

While the Amazon Web Services cloud itself appears to be operational, some users are finding that the management console is inaccessible and users are encountering the puppy dog error page as well.

These technical glitches are likely to cost Amazon millions of dollars in lost sales. One Click Retail estimates that Amazon sells about $1 million per minute during peak time on Prime Day, based on last year’s data. As of the time of writing, Amazon’s site issues had lasted for more than one hour.

Amazon provided the following statement to Business Insider: “Some customers are having difficulty shopping, and we’re working to resolve this issue quickly. Many are shopping successfully – in the first hour of Prime Day in the U.S., customers have ordered more items compared to the first hour last year. There are hundreds of thousands of deals to come and more than 34 hours to shop Prime Day.”

As for AWS, another spokesperson provided this statement: “AWS continues to function normally. We saw some intermittent AWS Management Console issues earlier today, but they did not drive any meaningful impact on Amazon’s consumer business.”

FBI: “Please Reboot Your Router”

Posted on

Plenty of news outlets have reported on the existence of a rather nasty-sounding malware – thought to originate in Russia – that may have already infected hundreds of thousands of Internet routers up and down the country. The FBI, however, may have a surprisingly easy fix for the problem: switch your router off, then turn it on again.

The official FBI public service announcement explains what this piece of malicious software is capable of. “VPNFilter is able to render small office and home office routers inoperable,” it notes, adding that “the malware can potentially also collect information passing through the router.”

It’s not easy to discover, either. Apparently, identifying and assessing the network activity of the malware in question “is complicated by its use of encryption and misattributable networks.”

Clearly, it’s a sophisticated piece of tech; the FBI attributes the malware to “foreign cyber actors” and The New York Times reports that it’s of Russian origin, with the Justice Department linking it to the Sofacy Group. Also known as Fancy Bear, this is the same Russian military intelligence agency outlet that hacked the DNC servers prior to the 2016 presidential election.

The FBI explains that “the size and scope of the infrastructure impacted by VPNFilter malware is significant. The malware targets routers produced by several manufacturers and network-attached storage devices by at least one manufacturer.”

This sounds both grim and complicated, which makes it all the more impressive that the temporary solution to the problem may be deceptively simple. “The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices,” it says, almost nonchalantly.

ArsTechnica reports that later “stages” of the malware, which steal data and so on, are temporarily disabled during a reboot. Upon rebooting, stage one calls out to the now-seized website for instructions, which allows the FBI to identify the infected device.

They also advise people to perhaps disable any remote management settings on their device, make sure their passwords are strong, and to activate any encryption software if available. If you can, make sure the devices are operating the most up-to-date version of the firmware.

According to the Guardian, the warning followed on from a recent court order that permitted the FBI to take control of a website, one the hackers planned to use to command the malware within the routers. Although this ability has since been disabled, the routers still remain infected if no further action has been taken on the part of the owners.

Far from just the US, by the way, infections have apparently been detected in at least 54 countries, with Ukraine thought to be the prime target for the hackers.

New Quickbooks on ShowMyOffice!

Posted on
quickbooks

You now have the latest version of Quickbooks!

We updated all of our hosted clients to Quickbooks Enterprise 18. Some new features and improvements include:

  • Control, customize, and automate your pricing right in QuickBooks with Advanced Pricing.6 Just set up price rules and all the calculations are done for you.
  • Advanced Reporting puts the information you need right at your fingertips. Build powerful, customizable reports that are auto-filled with company data. Easy templates for contractor, manufacturing & wholesale, non-profit, and retail let you create reports specifically for your industry.
  • Enterprise has 6x the capacity of other QuickBooks products, allowing for up to 1 million items, users, and vendors
  • Enterprise has editions dedicated to contractor, manufacturing and wholesale, nonprofit, and retail so that you can get specialized features like reports and chart of accounts specifically for your industry.
  • Grow your business without sacrificing control over user access. Set individual user permissions for every role. Predefined, user role templates are included for fast setup.
    Scale up to 30 users
  • Enterprise grows with you, letting you scale from 1 to 30 users who can all work at the same time. But you maintain access and control, assigning user permissions as you see fit for your business.9
    One-click insights dashboard
  • Know how your business is doing in one click. The insights dashboard tells the story of your business visually with graphs that zero in on key performance indicators like profit and loss, business growth, net profit margin, income and expenses, and top customers.
  • Having to remember the timing of various payroll liabilities — like federal and state payroll taxes and workers’ comp — can be a real stressor. But now you can rest easy knowing you’ll get a reminder right on your home screen seven days before liabilities are due
  • Large accounts are easier to manage with an added search bar right in Chart of Accounts. You can quickly find an account or subaccount and search by account name or account number.
    Cash/accrual toggle
  • Now all it takes is one click in the report window to switch from cash to accrual basis and back again. You’ll be able to easily analyze your business from different angles. It’s great for businesses that report in one basis and file taxes in another.
    Past due stamp
  • QuickBooks can automatically add a “Past Due” notice on overdue invoices so you can get customers to pay you faster. You can easily remove it from specific invoices by just toggling it off with one click.

Should you need any help, as always feel free to contact us.