Author: Aaron Tiainen

How safe is your Outlook Reading Pane?

How safe is your Outlook Reading Pane?

The reading pane in outlook is slightly safer than to use than opening a message. The reason for this is that no active content is allowed to run within the reading pane. The same applies to the attachments, since technically it shouldn’t allow active content to run either, however we suggest to be cautious of viewing attachments when the email doesn’t appear legitimate. There has been no reading pane exploits in the last 14 years, since Outlook 2000 SP1.

Unless you are using an email client or web browser which contains an unpatched security hole malicious emails can exploit, you’re fine. This shouldn’t be the case though as you should be using an up-to-date email client and web browser.

The real risk comes from following phishing links and opening dangerous attachments. The risks are the same whether you are using a desktop application like Microsoft Outlook or any web based email client, like Gmail.

There is usually a common denominator in most infections: the users need to perform a specific action to activate the exploit. In some cases, they need to visit a specially crafted web page and click a link. Unless a popular site is hacked and compromised with this vulnerability, the user will need to be tricked into visiting the site and clicking. In either case, the problem isn’t with Outlook and it’s not something Microsoft can control.

Is opening an Email safe?

Emails are basically text or HTML documents. Just like opening a text file or web page in your browser should be safe, so should opening an email message. If you are using Hotmail, Gmail, Outlook, Yahoo or any other email client – even a suspicious one – it should be safe. Some emails may try to infect you after you open them. They might contain malicious programs disguised as attachments, or have links to malicious websites which contain malware or scams. You should only open trustworthy attachments and be on the look out for suspicious attachments (such as .js, .exe or .com).

Was opening Emails once unsafe?

In the past, Microsoft Outlook had a serious security problem. Emails which were once just plain text were also allowed to contain HTML code: the same code that web pages like this one are written in. An Outlook vulnerability allowed emails to run JavaScript code and infect your computer. For this reason, just opening an email was potentially dangerous.

However, this vulnerability was fixed. Emails cannot use JavaScript. Modern email clients don’t even automatically display images in emails. As with web browsers, operating systems, and other computer programs, security holes are occasionally discovered and patched.

As long as you are using up-to-date software, including your mail client, browser, browser plugins, and operating system – you should be able to open email messages and view them without fear.

Email Safety Tips

File attachments and links in email can still present a real danger. Follow these best practices to stay safe:

  • Keep Your Mail Client, Web Browser, and Operating System Updated: Software updates are important, as the bad guys regularly find holes and try to exploit them. Software updates close these holes and protect you. If you are running an outdated browser and email client, you could be compromised. (If you have Java installed, you should uninstall it or at least disable the browser plugin to protect yourself, too.)
  • Use Antivirus Software: On Windows, antivirus software is an important layer of protection. It can help protect you from both mistakes and software bugs that allow malware to run without your permission.
  • Don’t Run Dangerous Attachments: If you get a PDF file from someone, it’s probably safe to open (especially if your PDF reader is up-to-date). However, if you suddenly get an email with a .exe file or another potentially dangerous type of file you aren’t expecting, even if it’s from someone you know, you probably shouldn’t run the attachment. Exercise extreme caution with email attachments as they are still a common source of infection.
  • Be Careful of Links: Clicking links should be safe, just as loading a website in your browser should be safe. However, if the link looks like it leads to a site packed with malware and potentially scams, you probably shouldn’t click it. If you do click a link, don’t download and run any potentially dangerous files. You should also watch out for phishing, if you click a link in an email that appears to be from your bank and end up on a similar-looking website, it may not actually be your bank’s website, but a clever imposter.

Wrong Delivery Address

Wrong Delivery Address

Here is another new Spam email. Another one purporting to be from DHL. Is this legitimate? No it absolutely isn’t.

A couple of things to note. The attachment is a .img file. A IMG file is something which windows will now open automatically, and then launch the autorun.inf file. This probably contains potentially harmful content which we really don’t want. Secondly, the email address isn’t correct for this company either.

What should you do? I would encourage that all attachments that are IMG or ISO files are blocked.

CRITICAL ACTION REQUIRED: Mailbox de-activation notice

CRITICAL ACTION REQUIRED: Mailbox de-activation notice

Another example of a fake email.

When you look at the email, it is not formed in a very good manner. This type of email is used to gain your email account username and password. Click on the link will take you to a page to enter your username and password, which they will then use to gain access to your emails and/or systems. Take a look at the senders email address and name. Also the use of colours in this type of email is unusual.

Now if you hover over the link, you will see the site it takes you to is certainly nothing like you have probably been to before. The safest bet is to pass it only your system administrator.

Windows 7 End of Life.  How much should you worry?

Windows 7 End of Life. How much should you worry?

Windows 7 is due to reach end of life (EOL) on the 14th January 2020. There are still a very large number of the worlds computers running this software, mostly in corporate environments. Microsoft ended mainstream support in January 2015 with the extended support running till January 2020.

This EOL means no more bug-fixes, security patches or new functionality which makes it significantly more susceptible to malware attacks. Just as it did with Windows XP, Microsoft will continue to offer support for those Windows 7 users still reluctant to upgrade, but it will cost you.

Windows 7 was the version of Windows most widely affected by the WannaCry exploit in 2017. This attack leveraged the EternalBlue vulnerability as an entry point. Windows 7 is still vulnerable to the recently disclosed Bluekeep bug and several other flaws that Microsoft patched in August this year.

How big is the Security Threat?

The longer you use an outdated operating system, the more likely vulnerabilities will appear and become a potential for attacks. If you take the older Windows XP platform, WannaCry infected companies of all sizes and industries around the world. Some companies didn’t realise their operations relied on Windows XP until they were affected. Because of this threat, Microsoft ultimately stepped in and issued an emergency patch for the operating system. Could the same thing happen with Windows 7? It’s likely it will.

What should you do?

Ultimately, this becomes a conversation about risk to your business. It is important to realise that this doesn’t instantly mean unpatched devices will result in a data breach. It means, without ongoing security updates, the number of unpatched vulnerabilities will continue to grow. However, having those vulnerabilities doesn’t mean that your organisation will be attacked.

Ideally, upgrade your machines to Windows 10. If that isn’t possible, ensure that all security patches and hotfixes are applied for your operating system. This isn’t something which you need to jump on top of immediately, but consideration should be given to upgrading. For our current clients, we will provide you with a plan going forward.

Can you extend your Windows 7 support?

In short, yes. Only if you are using Windows 7 Professional or Enterprise (Microsoft Extended Support). Microsoft will allow the users of Windows 7 Professional and Windows 7 Enterprise to extend their Windows 7 security updates through to January 2023. They will of course charge you for this privilege, but it will give your organisation time to plan moving forward with Windows 10.

Presently, the estimate for this is $50.00USD per machine per year, but we are yet to receive a formal price plan. We will update this post once we have some more information.

Update: 9 December 2019

Support for Windows 7 ends on January 14, 2020. While many customers are well on their way to deploying Windows 10, Microsoft understands that everyone is at a different point in the upgrade process. On December 1, 2019, businesses of any size with Windows 7 Professional or Windows 7 Enterprise will be able to purchase Extended Security Updates (ESU) through a Cloud Solution Provider (Network Alliance is a CSP). The Windows 7 ESU will be sold on a per-device basis and the price will increase each year.

The cost for the Windows 7 Extended Security Updates during 2020 is $75.00 ex GST (Update: 14 January 2020 – Pricing is actually $88.00 ex GST per year) for the year. This will increase in 2021 and again in 2022.

More resources about Windows 7 Extended Support can be found below:

Update: 7 January 2020 – PEXA Access

Some of you will start to get emails regarding access to the PEXA platform. PEXA recommend (and rightly so) to upgrade to a supported platform as soon as you practically can. If you are planning to subscribe to the Extended Security Updates then we advise that you notify PEXA of this so that you can ensure a continuity of access to their services. They will not cease to let you use their services. Please note that this applies to Windows 7, Windows Server 2008 and Windows Server 2008R2 as well. If you email support@pexa.com.au, and include your company name, contact details and proof of your ESU purchase, then this will ensure you are still able to use their services. For our clients, we will do this on your behalf.

Update: 15 January 2020 – Windows 7 Support Ended

So – the day has come where Windows 7 has retired, but not for all though. Whilst we encourage firms to look to upgrading to Windows 10 as soon as possible, you can continue to get security updates at a cost. Reasons for doing this is that you can’t upgrade do to some software issues, or replacement of all hardware at once is too costly.

A few other things which might be pertinent to you or your firm could be

  • Media Center Support
  • Privacy Issues
  • Forced Windows 10 Updates
  • Compatibility Issues

Does this mean the world is going to end? No, absolutely not. What it does mean though, is that you won’t get it for free. For businesses that want to take their time and decide their next step, then you can subscribe to the extended security update plan with Microsoft.

Theme: Overlay by Kaira Dedicated and Reliable Computer Support.
Brisbane, Queensland, Australia